Description
The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Subscriptions
Antiy
Subscribe
Avl Sdk
Subscribe
Ca
Subscribe
Etrust Vet Antivirus
Subscribe
Drweb
Subscribe
Dr.web Antivirus
Subscribe
Emsisoft
Subscribe
Anti-malware
Subscribe
Fortinet
Subscribe
Fortinet Antivirus
Subscribe
Ikarus
Subscribe
Ikarus Virus Utilities T3 Command Line Scanner
Subscribe
Kaspersky
Subscribe
Kaspersky Anti-virus
Subscribe
Mcafee
Subscribe
Gateway
Subscribe
Microsoft
Subscribe
Security Essentials
Subscribe
Pandasecurity
Subscribe
Panda Antivirus
Subscribe
Rising-global
Subscribe
Rising Antivirus
Subscribe
Sophos
Subscribe
Sophos Anti-virus
Subscribe
Trendmicro
Subscribe
Housecall
Subscribe
Trend Micro Antivirus
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T19:01:01.269Z
Reserved: 2012-02-29T00:00:00.000Z
Link: CVE-2012-1453
No data.
Status : Deferred
Published: 2012-03-21T10:11:48.847
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-1453
No data.
OpenCVE Enrichment
No data.
Weaknesses