CVE-2012-1446

Loading...

General

Score:4.3/10.0
Severity:Low
Category:Access Control Error
Exploit:Available

Impact Metrics

Confidentiality:None
Integrity:Partial
Availability:None

Exploitability Metrics

Access Vector:Network
Access Complexity:Medium
Authentication:None

Published on 21/03/12 - Updated on 28/07/12

Description

The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Norman Antivirus 6.06.12, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, McAfee Gateway (formerly Webwasher) 2010.1C, Sophos Anti-Virus 4.61.0, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified encoding field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.

Category: Access Control Error

CWE-264 (Permissions, Privileges, and Access Control)
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.

Security Notices

US National Vulnerability DatabaseCVE-2012-1446

Exploits

SecurityFocusBID-52600

Relative technologies

VendorProduct
aladdinesafe
antiyavl_sdk
caetrust_vet_antivirus
catquick_heal
fortinetfortinet_antivirus
kasperskykaspersky_anti-virus
mcafeegateway
mcafeescan_engine
normannorman_antivirus_&_antispyware
pandasecuritypanda_antivirus
pc_toolspc_tools_antivirus
rising-globalrising_antivirus
sophossophos_anti-virus
symantecendpoint_protection

Share this vulnerability with:

Twitter Facebook LinkedIn Mail