Lucene search

K
cve[email protected]CVE-2012-1443
HistoryMar 21, 2012 - 10:11 a.m.

CVE-2012-1443

2012-03-2110:11:48
CWE-264
web.nvd.nist.gov
37
cve-2012-1443
rar file parser
antivirus products
remote attackers
malware detection
vulnerability

6.5 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.975 High

EPSS

Percentile

100.0%

The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.

Affected configurations

NVD
Node
ahnlabv3_internet_securityMatch2011.01.18.00
OR
aladdinesafeMatch7.0.17.0
OR
alwilavast_antivirusMatch4.8.1351.0
OR
alwilavast_antivirusMatch5.0.677.0
OR
anti-virusvba32Match3.12.14.2
OR
antiyavl_sdkMatch2.0.3.7
OR
authentiumcommand_antivirusMatch5.2.11.5
OR
avgavg_anti-virusMatch10.0.0.1190
OR
aviraantivirMatch7.11.1.163
OR
bitdefenderbitdefenderMatch7.2
OR
catquick_healMatch11.00
OR
clamavclamavMatch0.96.4
OR
comodocomodo_antivirusMatch7424
OR
emsisoftanti-malwareMatch5.1.0.1
OR
esetnod32_antivirusMatch5795
OR
f-protf-prot_antivirusMatch4.6.2.117
OR
f-securef-secure_anti-virusMatch9.0.16160.0
OR
fortinetfortinet_antivirusMatch4.2.254.0
OR
gdata-softwareg_data_antivirusMatch21
OR
ikarusikarus_virus_utilities_t3_command_line_scannerMatch1.1.97.0
OR
jiangminjiangmin_antivirusMatch13.0.900
OR
k7computingantivirusMatch9.77.3565
OR
kasperskykaspersky_anti-virusMatch7.0.0.125
OR
mcafeegatewayMatch2010.1c
OR
mcafeescan_engineMatch5.400.0.1158
OR
microsoftsecurity_essentialsMatch2.0
OR
normannorman_antivirus_\&_antispywareMatch6.06.12
OR
nprotectnprotect_antivirusMatch2011-01-17.01
OR
pandasecuritypanda_antivirusMatch10.0.2.7
OR
pc_toolspc_tools_antivirusMatch7.0.3.5
OR
rising-globalrising_antivirusMatch22.83.00.03
OR
sophossophos_anti-virusMatch4.61.0
OR
symantecendpoint_protectionMatch11.0
OR
trendmicrohousecallMatch9.120.0.1004
OR
trendmicrotrend_micro_antivirusMatch9.120.0.1004
OR
virusbustervirusbusterMatch13.6.151.0

6.5 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.975 High

EPSS

Percentile

100.0%