The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Antiy
Subscribe
|
Avl Sdk
Subscribe
|
|
Ca
Subscribe
|
Etrust Vet Antivirus
Subscribe
|
|
Drweb
Subscribe
|
Dr.web Antivirus
Subscribe
|
|
Emsisoft
Subscribe
|
Anti-malware
Subscribe
|
|
Fortinet
Subscribe
|
Fortinet Antivirus
Subscribe
|
|
Ikarus
Subscribe
|
Ikarus Virus Utilities T3 Command Line Scanner
Subscribe
|
|
Kaspersky
Subscribe
|
Kaspersky Anti-virus
Subscribe
|
|
Mcafee
Subscribe
|
Gateway
Subscribe
|
|
Microsoft
Subscribe
|
Security Essentials
Subscribe
|
|
Pandasecurity
Subscribe
|
Panda Antivirus
Subscribe
|
|
Rising-global
Subscribe
|
Rising Antivirus
Subscribe
|
|
Sophos
Subscribe
|
Sophos Anti-virus
Subscribe
|
|
Trendmicro
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T19:01:01.269Z
Reserved: 2012-02-29T00:00:00.000Z
Link: CVE-2012-1453
No data.
Status : Deferred
Published: 2012-03-21T10:11:48.847
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-1453
No data.
OpenCVE Enrichment
No data.
Weaknesses