CVE-2012-1460
Published Mar 21, 2012
Last updated 7 years ago
Overview
- Description
- The Gzip file parser in Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with stray bytes at the end. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C6590DF-9164-4A76-ADEE-9110C5E3588E" }, { "criteria": "cpe:2.3:a:anti-virus:vba32:3.12.14.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A0325DA-A137-41E0-BD5E-B892F2166749" }, { "criteria": "cpe:2.3:a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38855431-9C17-41FE-8325-A3304DECAC92" }, { "criteria": "cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "192DFD98-11AA-4E7A-A1CB-53FC06FEB20F" }, { "criteria": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "343D3F40-E028-4AEE-82A4-0A17C1D1ED13" }, { "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "961708EB-3124-4147-A36D-BAD9241D0C88" }, { "criteria": "cpe:2.3:a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "620DC756-B821-413C-A824-43C221E573AA" }, { "criteria": "cpe:2.3:a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B27BD224-CB70-43D2-8B0D-9F229A646B82" } ], "operator": "OR" } ] } ]