// For flags

CVE-2012-1462

 

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The ZIP file parser in AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, Norman Antivirus 6.06.12, Sophos Anti-Virus 4.61.0, and AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11 allows remote attackers to bypass malware detection via a ZIP file containing an invalid block of data at the beginning. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ZIP parser implementations.

El analizador de archivos ZIP en AhnLab V3 Internet Security v2011.01.18.00, AVG Anti-Virus v10.0.0.1190, Quick Heal (también conocido como Cat QuickHeal) v11.00, a-squared Anti-Malware v5.1.0.1, eSafe v7.0.17.0, Fortinet Antivirus v4.2.254.0, Ikarus Virus Utilities T3 escáner de línea de comandos v1.1.97.0, Jiangmin Antivirus v13.0.900, Kaspersky Anti-Virus v7.0.0.125, Norman Antivirus v6.6.12, Sophos Anti-Virus v4.61.0, y AVEngine v20101.3.0.103 de Symantec Endpoint Protection v11 permite a los atacantes remotos eludir la detección de malware a través de un archivo ZIP que contiene un bloque de datos no válido en el cominezo. NOTA: esto más tarde se puede dividir en varios CVEs si la información adicional que se publica muestra que el error se produjo de forma independiente en diferentes implementaciones de área del analizador.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-02-29 CVE Reserved
  • 2012-03-21 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-11-09 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ahnlab
Search vendor "Ahnlab"
V3 Internet Security
Search vendor "Ahnlab" for product "V3 Internet Security"
2011.01.18.00
Search vendor "Ahnlab" for product "V3 Internet Security" and version "2011.01.18.00"
-
Affected
Aladdin
Search vendor "Aladdin"
Esafe
Search vendor "Aladdin" for product "Esafe"
7.0.17.0
Search vendor "Aladdin" for product "Esafe" and version "7.0.17.0"
-
Affected
Avg
Search vendor "Avg"
Avg Anti-virus
Search vendor "Avg" for product "Avg Anti-virus"
10.0.0.1190
Search vendor "Avg" for product "Avg Anti-virus" and version "10.0.0.1190"
-
Affected
Cat
Search vendor "Cat"
Quick Heal
Search vendor "Cat" for product "Quick Heal"
11.00
Search vendor "Cat" for product "Quick Heal" and version "11.00"
-
Affected
Emsisoft
Search vendor "Emsisoft"
Anti-malware
Search vendor "Emsisoft" for product "Anti-malware"
5.1.0.1
Search vendor "Emsisoft" for product "Anti-malware" and version "5.1.0.1"
-
Affected
Fortinet
Search vendor "Fortinet"
Fortinet Antivirus
Search vendor "Fortinet" for product "Fortinet Antivirus"
4.2.254.0
Search vendor "Fortinet" for product "Fortinet Antivirus" and version "4.2.254.0"
-
Affected
Ikarus
Search vendor "Ikarus"
Ikarus Virus Utilities T3 Command Line Scanner
Search vendor "Ikarus" for product "Ikarus Virus Utilities T3 Command Line Scanner"
1.1.97.0
Search vendor "Ikarus" for product "Ikarus Virus Utilities T3 Command Line Scanner" and version "1.1.97.0"
-
Affected
Jiangmin
Search vendor "Jiangmin"
Jiangmin Antivirus
Search vendor "Jiangmin" for product "Jiangmin Antivirus"
13.0.900
Search vendor "Jiangmin" for product "Jiangmin Antivirus" and version "13.0.900"
-
Affected
Kaspersky
Search vendor "Kaspersky"
Kaspersky Anti-virus
Search vendor "Kaspersky" for product "Kaspersky Anti-virus"
7.0.0.125
Search vendor "Kaspersky" for product "Kaspersky Anti-virus" and version "7.0.0.125"
-
Affected
Symantec
Search vendor "Symantec"
Endpoint Protection
Search vendor "Symantec" for product "Endpoint Protection"
11.0
Search vendor "Symantec" for product "Endpoint Protection" and version "11.0"
-
Affected