8 results (0.008 seconds)

CVSS: 4.3EPSS: 97%CPEs: 9EXPL: 0

The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, and nProtect Anti-Virus 2011-01-17.01 allows remote attackers to bypass malware detection via an ELF file with a ustar character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations. El analizador de archivos ELF en BitDefender 7.2, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, McAfee Anti-Virus motor de Detección de 5.400.0.1158, McAfee gateway (anteriormente Webwasher) 2010.1C y nProtect anti-Virus 2011-01-17.01 permite a atacantes remotos evitar la detección de malware a través de un archivo ELF con una secuencia de caracteres ustar en un lugar determinado. NOTA: esto más adelante se puede dividir en varios CVEs si la información adicional que se publica muestra que el error se produjo de forma independiente en diferentes implementaciones del analizador. ELF • http://www.ieee-security.org/TC/SP2012/program.html http://www.securityfocus.com/archive/1/522005 https://exchange.xforce.ibmcloud.com/vulnerabilities/74244 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 15%CPEs: 9EXPL: 0

Integer overflow in the packed PE file parsing implementation in BitDefender products before 20060829, including Antivirus, Antivirus Plus, Internet Security, Mail Protection for Enterprises, and Online Scanner; and BitDefender products for Microsoft ISA Server and Exchange 5.5 through 2003; allows remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow, aka the "cevakrnl.xmd vulnerability." Desbordamiento de enteros en el fichero de la implementación del análisis sintáctico del paquete PE de los productos BitDefender anteriores a la 20060829,incluyendo Antivirus, Antivirus Plus, Internet Security, Mail Protection para Enterprises y Online Scanner, y los productos BitDefender para Microsoft ISA Server y Exchange 5.5 hasta el 2003, permite a atacantes remotos ejecutar código de su elección mediante un fichero modificado, que dispara un desbordamiento de búfer basado en pila, también conocido como "vulnerabilidad cevakrnl.xmd". • http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051319.html http://secunia.com/advisories/23415 http://securityreason.com/securityalert/2044 http://securitytracker.com/id?1017389 http://www.bitdefender.com/KB323-en--cevakrnl.xmd-vulnerability.html http://www.securityfocus.com/archive/1/454501/100/0/threaded http://www.securityfocus.com/bid/21610 http://www.vupen.com/english/advisories/2006/5040 https://exchange.xforce.ibmcloud.com/vulnerabilities/30904 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

BitDefender Mail Protection for SMB 2.0 allows remote attackers to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file. BitDefender Mail Protection para SMB 2.0 permite a atacantes remotos evitar una detección de virus, insertando caracteres inválidos en un contenido codificado base64 en un fichero MIME multipart/mixed, tal y como se demuestra con el fichero de testeo EICAR. • http://www.quantenblog.net/security/virus-scanner-bypass http://www.securityfocus.com/archive/1/453654/100/0/threaded http://www.securityfocus.com/bid/21461 •

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 1

Multiple interpretation error in unspecified versions of BitDefender Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper. • http://marc.info/?l=bugtraq&m=112879611919750&w=2 http://shadock.net/secubox/AVCraftedArchive.html •

CVSS: 7.5EPSS: 10%CPEs: 3EXPL: 0

Format string vulnerability in the logging functionality in BitDefender AntiVirus 7.2 through 9 allows remote attackers to cause a denial of service and possibly execute arbitrary code via format string specifiers in file or directory name. • http://kb.bitdefender.com/KB261-en--Filename-Format-String-Vulnerability.html http://secunia.com/advisories/16991 http://securityreason.com/securityalert/45 http://shadock.net/secubox/BitDefenderLoggingFunc.html http://www.securityfocus.com/bid/14968 • CWE-134: Use of Externally-Controlled Format String •