CVE-2012-1463
Published Mar 21, 2012
Last updated 7 years ago
Overview
- Description
- The ELF file parser in AhnLab V3 Internet Security 2011.01.18.00, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified endianness field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ahnlab:v3_internet_security:2011.01.18.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B91745E-EA83-4C70-BF2D-45A3678FA157" }, { "criteria": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C6590DF-9164-4A76-ADEE-9110C5E3588E" }, { "criteria": "cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "192DFD98-11AA-4E7A-A1CB-53FC06FEB20F" }, { "criteria": "cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24D7D7FA-20E9-4560-ABC6-154CD918E307" }, { "criteria": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "343D3F40-E028-4AEE-82A4-0A17C1D1ED13" }, { "criteria": "cpe:2.3:a:comodo:comodo_antivirus:7424:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "803A9A92-A984-43A8-8D27-C9A6FDB19A9D" }, { "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "961708EB-3124-4147-A36D-BAD9241D0C88" }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:9.0.16160.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB884937-53F0-4BB5-AA8F-1CCDCD1221D9" }, { "criteria": "cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BCE1228-61BE-4C10-898A-B8BDC5A71156" }, { "criteria": "cpe:2.3:a:norman:norman_antivirus_\\&_antispyware:6.06.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81D01633-1000-425D-9026-59C50734956A" }, { "criteria": "cpe:2.3:a:nprotect:nprotect_antivirus:2011-01-17.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D386C31F-6114-4A15-B0D5-15686D7EF8B8" }, { "criteria": "cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D95F8C32-D238-493F-A28D-8A588E8ADD13" } ], "operator": "OR" } ] } ]