4 results (0.005 seconds)

CVSS: 4.3EPSS: 97%CPEs: 9EXPL: 0

The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, and nProtect Anti-Virus 2011-01-17.01 allows remote attackers to bypass malware detection via an ELF file with a ustar character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations. El analizador de archivos ELF en BitDefender 7.2, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, McAfee Anti-Virus motor de Detección de 5.400.0.1158, McAfee gateway (anteriormente Webwasher) 2010.1C y nProtect anti-Virus 2011-01-17.01 permite a atacantes remotos evitar la detección de malware a través de un archivo ELF con una secuencia de caracteres ustar en un lugar determinado. NOTA: esto más adelante se puede dividir en varios CVEs si la información adicional que se publica muestra que el error se produjo de forma independiente en diferentes implementaciones del analizador. ELF • http://www.ieee-security.org/TC/SP2012/program.html http://www.securityfocus.com/archive/1/522005 https://exchange.xforce.ibmcloud.com/vulnerabilities/74244 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 15%CPEs: 9EXPL: 0

Integer overflow in the packed PE file parsing implementation in BitDefender products before 20060829, including Antivirus, Antivirus Plus, Internet Security, Mail Protection for Enterprises, and Online Scanner; and BitDefender products for Microsoft ISA Server and Exchange 5.5 through 2003; allows remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow, aka the "cevakrnl.xmd vulnerability." Desbordamiento de enteros en el fichero de la implementación del análisis sintáctico del paquete PE de los productos BitDefender anteriores a la 20060829,incluyendo Antivirus, Antivirus Plus, Internet Security, Mail Protection para Enterprises y Online Scanner, y los productos BitDefender para Microsoft ISA Server y Exchange 5.5 hasta el 2003, permite a atacantes remotos ejecutar código de su elección mediante un fichero modificado, que dispara un desbordamiento de búfer basado en pila, también conocido como "vulnerabilidad cevakrnl.xmd". • http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051319.html http://secunia.com/advisories/23415 http://securityreason.com/securityalert/2044 http://securitytracker.com/id?1017389 http://www.bitdefender.com/KB323-en--cevakrnl.xmd-vulnerability.html http://www.securityfocus.com/archive/1/454501/100/0/threaded http://www.securityfocus.com/bid/21610 http://www.vupen.com/english/advisories/2006/5040 https://exchange.xforce.ibmcloud.com/vulnerabilities/30904 •

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 1

Multiple interpretation error in unspecified versions of BitDefender Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper. • http://marc.info/?l=bugtraq&m=112879611919750&w=2 http://shadock.net/secubox/AVCraftedArchive.html •

CVSS: 1.2EPSS: 0%CPEs: 2EXPL: 0

Unquoted Windows search path vulnerability in BitDefender 8 allows local users to prevent BitDefender from starting by creating a malicious C:\program.exe, possibly due to the lack of quoting of the full pathname when executing a process. • http://marc.info/?l=bugtraq&m=111420400316397&w=2 http://secunia.com/advisories/15076 http://www.osvdb.org/15818 •