Vulnerabilites related to eset - nod32
Vulnerability from fkie_nvd
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
▼ | URL | Tags | |
---|---|---|---|
security@eset.com | https://support.eset.com/en/ca8688 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.eset.com/en/ca8688 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
eset | internet_security | * | |
eset | nod32 | * | |
eset | security | * | |
eset | smart_security | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_security | * | |
eset | server_security | * | |
eset | mail_security | * | |
eset | mail_security | - | |
eset | security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "B883CA27-1FC9-4AF6-9BBD-6FC41DE3A667", "versionEndExcluding": "17.2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:*:*:*:*:*:*:*:*", "matchCriteriaId": "620325BE-DDE6-4ADE-BB6A-36CA8E48A30A", "versionEndExcluding": "17.2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:ultimate:*:*:*", "matchCriteriaId": "0EB1BEC6-15AD-4B95-A954-814594AE8FCB", "versionEndExcluding": "17.2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*", "matchCriteriaId": "B5D76653-60CC-4107-A027-02E2A1B255DE", "versionEndExcluding": "17.2.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "102DE882-64EA-4752-9722-2EAE0074BF91", "versionEndExcluding": "11.1.2039.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "56305C95-A7D6-49BC-8CEE-5EA343190842", "versionEndExcluding": "11.1.2039.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "9F9E6C2C-AA89-4377-B0A0-6B3B36209B90", "versionEndExcluding": "11.0.12012.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "A8906CBA-D3F0-4BC1-B32A-11D4425EE784", "versionEndIncluding": "11.0.10008.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:*", "matchCriteriaId": "5043B5B1-38B2-4621-B738-A79E5DF8D98E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "61BC0A21-A589-48B5-9D35-E0E8749EDFDB", "versionEndExcluding": "11.0.15004.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\u2019s security product inoperable, provided non-default preconditions were met." }, { "lang": "es", "value": "La vulnerabilidad de denegaci\u00f3n de servicio presente poco despu\u00e9s de la instalaci\u00f3n o actualizaci\u00f3n del producto, potencialmente permiti\u00f3 que un atacante dejara inoperable el producto de seguridad de ESET, siempre que se cumplieran condiciones previas no predeterminadas." } ], "id": "CVE-2024-3779", "lastModified": "2024-11-21T09:30:22.927", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.2, "source": "security@eset.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-16T09:15:02.877", "references": [ { "source": "security@eset.com", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8688" } ], "sourceIdentifier": "security@eset.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "security@eset.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
security@eset.com | https://support.eset.com/en/ca8466 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.eset.com/en/ca8466 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
eset | endpoint_antivirus | - | |
eset | endpoint_security | - | |
eset | internet_security | - | |
eset | mail_security | - | |
eset | mail_security | - | |
eset | nod32 | - | |
eset | security | - | |
eset | server_security | - | |
eset | smart_security | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:-:*:*:*:*:-:*:*", "matchCriteriaId": "2B76C798-A8F7-4705-B85A-98CE4C44AC53", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:-:*:*:*:*:*:*:*", "matchCriteriaId": "81593DEE-54D7-49D5-9AE6-20B7E2B0AF8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2CAD248-1F32-4459-A530-8706E334C67F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:*", "matchCriteriaId": "5043B5B1-38B2-4621-B738-A79E5DF8D98E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:-:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "DE40A56E-EBC0-43C8-85FB-868802B4817F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:*:*:*:*:*:*:*", "matchCriteriaId": "82540E3B-B426-424F-A6FD-C0AAB596389A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:-:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "D6CCDFB5-D27D-40F5-9BFC-274DA84783E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:-:*:*:*:*:windows_server:*:*", "matchCriteriaId": "74BC745B-A4C5-4EAE-B985-78FDA3C40516", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:-:*:*:*:premium:*:*:*", "matchCriteriaId": "375F46B4-9FDF-48FB-935A-8BB6FEF5221A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nThe vulnerability potentially allows an attacker to misuse ESET\u2019s file operations during the module update to delete or move files without having proper permissions." } ], "id": "CVE-2023-3160", "lastModified": "2024-11-21T08:16:35.520", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security@eset.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-14T10:15:09.503", "references": [ { "source": "security@eset.com", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8466" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8466" } ], "sourceIdentifier": "security@eset.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "security@eset.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/136082/ESET-NOD32-Heap-Overflow.html | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.virusradar.com/en/update/info/11861 | Product | |
cve@mitre.org | https://bugs.chromium.org/p/project-zero/issues/detail?id=466 | Exploit, Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/136082/ESET-NOD32-Heap-Overflow.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.virusradar.com/en/update/info/11861 | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.chromium.org/p/project-zero/issues/detail?id=466 | Exploit, Issue Tracking |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:nod32:-:10951:*:*:*:*:*:*", "matchCriteriaId": "21950E84-19C2-4DF4-9E8A-272026C07F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10952:*:*:*:*:*:*", "matchCriteriaId": "E2335D79-7ADF-4786-8FBC-4BF743942F62", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10953:*:*:*:*:*:*", "matchCriteriaId": "7956B514-FB04-4E7B-91C1-E609588FC93E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10954:*:*:*:*:*:*", "matchCriteriaId": "5EED764E-2A65-4614-A4EF-1C72A6DF7528", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10955:*:*:*:*:*:*", "matchCriteriaId": "3D9010AF-7660-4BC6-A7A2-6990A27FB071", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10956:*:*:*:*:*:*", "matchCriteriaId": "80DF98DC-A3F7-4705-9FE3-97A909A5099E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10957:*:*:*:*:*:*", "matchCriteriaId": "084D06D5-6A15-43EA-B25F-ABEDB2C18639", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10958:*:*:*:*:*:*", "matchCriteriaId": "2C46975C-1EC9-478B-95C6-7AC19FDB813A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10959:*:*:*:*:*:*", "matchCriteriaId": "081396AA-CAB6-46E6-BAFE-D816BE2E4CC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10960:*:*:*:*:*:*", "matchCriteriaId": "DFD80568-2EED-488A-A08B-974F7ED34BF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10961:*:*:*:*:*:*", "matchCriteriaId": "8FE209E0-AD2C-4729-87F7-921DA420DDDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10962:*:*:*:*:*:*", "matchCriteriaId": "435D9FEC-21AE-4557-B6CA-06379E051761", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10963:*:*:*:*:*:*", "matchCriteriaId": "FBDA1658-AE2A-429A-AAAB-E4874CE871B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10964:*:*:*:*:*:*", "matchCriteriaId": "FA4D4214-E2B4-4792-ADA2-027C0DB1ACD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10965:*:*:*:*:*:*", "matchCriteriaId": "8AEB2B4F-58CC-4BBA-87DA-DADB8EB1562D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10966:*:*:*:*:*:*", "matchCriteriaId": "26DEE8FB-CDD1-407F-AD9D-C57D4E4FBD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10967:*:*:*:*:*:*", "matchCriteriaId": "A3221A70-D783-4AFA-81C0-6025890C7A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10968:*:*:*:*:*:*", "matchCriteriaId": "664BEE4A-2227-4C62-8645-35143FCD7F1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10969:*:*:*:*:*:*", "matchCriteriaId": "211365E9-CFAB-4410-A2BC-0C28DF3984C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10970:*:*:*:*:*:*", "matchCriteriaId": "0DED7CBE-A705-4226-B3E2-231BE0A5A8CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10971:*:*:*:*:*:*", "matchCriteriaId": "95431BF6-D060-4469-953C-8EC579D68CBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10972:*:*:*:*:*:*", "matchCriteriaId": "813C1B91-4E4C-47D3-9B73-7EC51162DA43", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10973:*:*:*:*:*:*", "matchCriteriaId": "E0740349-606F-4773-872B-C19D8F77FC3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10974:*:*:*:*:*:*", "matchCriteriaId": "A21538F8-4D33-416C-905D-67A808ADA696", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10975:*:*:*:*:*:*", "matchCriteriaId": "178B7494-F29F-46BE-863F-28BC83DA2306", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10976:*:*:*:*:*:*", "matchCriteriaId": "3485268E-707B-4249-8F7C-55510BC89DEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10977:*:*:*:*:*:*", "matchCriteriaId": "BF65F808-16CB-4B7A-B0D8-8776EE09CAE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10978:*:*:*:*:*:*", "matchCriteriaId": "E7E13865-6E53-4C8C-9C27-41B5086631AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10979:*:*:*:*:*:*", "matchCriteriaId": "F01F0EB8-4A47-456F-8EEC-9D6C10D10DB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10980:*:*:*:*:*:*", "matchCriteriaId": "A2F9B140-A984-47A5-BD07-010D8F552A27", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10981:*:*:*:*:*:*", "matchCriteriaId": "07EC5A2F-F977-40AF-A8B1-4EFB4870CE56", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10982:*:*:*:*:*:*", "matchCriteriaId": "697609E7-1D0F-457E-AABB-48441270601B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10983:*:*:*:*:*:*", "matchCriteriaId": "73345200-61FB-4C5E-B680-F934EC8B4FE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10984:*:*:*:*:*:*", "matchCriteriaId": "587F11A4-54B9-4D9B-8020-BFD61BEA9B1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10985:*:*:*:*:*:*", "matchCriteriaId": "46581326-6860-43F2-98B4-F4C9A3F71CBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10986:*:*:*:*:*:*", "matchCriteriaId": "D8D00A3D-57B9-49E2-921F-7B07BDF0AFD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10987:*:*:*:*:*:*", "matchCriteriaId": "95CB62E5-E802-4BE3-8E20-A306187E2F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10988:*:*:*:*:*:*", "matchCriteriaId": "B6D83DA0-8DC6-4145-A23C-D2029D56A2B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10989:*:*:*:*:*:*", "matchCriteriaId": "5415AD91-E3EC-46E2-9107-83805416F03B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10990:*:*:*:*:*:*", "matchCriteriaId": "6326CD17-8F43-4BF9-A920-A042C4901CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10991:*:*:*:*:*:*", "matchCriteriaId": "3C31B234-462E-4977-8820-76E72CA83256", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10992:*:*:*:*:*:*", "matchCriteriaId": "8C6311F4-98D7-457D-9D60-B1FC3D342A64", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10993:*:*:*:*:*:*", "matchCriteriaId": "2DE8F8C3-5873-497B-92C3-7B84F910F577", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10994:*:*:*:*:*:*", "matchCriteriaId": "DB90BDD9-A2FD-4341-A4EF-D4BB2D4E0797", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10995:*:*:*:*:*:*", "matchCriteriaId": "E9F6C55D-649A-4C3E-B9C3-1535BF3F0257", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10996:*:*:*:*:*:*", "matchCriteriaId": "B149A087-FDBC-47E7-80F1-FD03D1F17627", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10997:*:*:*:*:*:*", "matchCriteriaId": "60D2B9CD-D243-4269-9DF0-CC0C0B65DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10998:*:*:*:*:*:*", "matchCriteriaId": "64B1C5D5-8908-411C-9F65-58074E4DD49B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:10999:*:*:*:*:*:*", "matchCriteriaId": "FA0B042B-C459-4315-B015-0F66277D2DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11000:*:*:*:*:*:*", "matchCriteriaId": "D3F514A6-7BE7-44B3-864E-5C7E67AA380F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11001:*:*:*:*:*:*", "matchCriteriaId": "8C9EC39B-D8AF-409B-ADE5-9A7D7FE6A70D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11002:*:*:*:*:*:*", "matchCriteriaId": "0679EF52-5E9E-4235-AAB4-8BCE20976E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11003:*:*:*:*:*:*", "matchCriteriaId": "676CECAD-D66C-4F86-A0E2-9611FE384724", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11004:*:*:*:*:*:*", "matchCriteriaId": "F19CAAC8-77B0-4B75-A446-6178A45E1069", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11005:*:*:*:*:*:*", "matchCriteriaId": "A80F5A45-ADB3-4661-8217-D4A285935A78", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11006:*:*:*:*:*:*", "matchCriteriaId": "42013ADA-1401-4B32-AB52-38AD55E42F17", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11007:*:*:*:*:*:*", "matchCriteriaId": "5A9B07D7-AF5C-4752-8A13-54BB813DD969", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11008:*:*:*:*:*:*", "matchCriteriaId": "7C4AC893-E57B-486D-ADE0-CCFAC0980C68", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11009:*:*:*:*:*:*", "matchCriteriaId": "4BA964FC-0402-44C6-B653-C78E3395BC33", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11010:*:*:*:*:*:*", "matchCriteriaId": "E393B9C3-603A-40F7-9FB5-4E6F071C072F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11011:*:*:*:*:*:*", "matchCriteriaId": "C671DC07-DCF3-4220-95AA-6C4145F09D32", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11012:*:*:*:*:*:*", "matchCriteriaId": "C68000CC-1BAA-495E-BBE9-E8437005FD41", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11013:*:*:*:*:*:*", "matchCriteriaId": "3569C1D6-4ACF-4767-B26D-432101056BAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11014:*:*:*:*:*:*", "matchCriteriaId": "FF4BAD80-45D2-4DBA-8B09-6B1CBFC9A69B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11015:*:*:*:*:*:*", "matchCriteriaId": "0429CAFD-9F90-4AB8-8B58-E3F810C08732", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11016:*:*:*:*:*:*", "matchCriteriaId": "04688E10-2C31-439C-BF99-7E2E0E7ED0DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11017:*:*:*:*:*:*", "matchCriteriaId": "DE40EABF-9459-45D6-83A6-CFE4BA63C8AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11018:*:*:*:*:*:*", "matchCriteriaId": "3BA21D28-BFAE-4693-AB8A-1FBF5BAED2D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11019:*:*:*:*:*:*", "matchCriteriaId": "DD0BBD7C-1C73-491C-8DBB-F281918D5AB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11020:*:*:*:*:*:*", "matchCriteriaId": "A4002144-F486-4395-98F6-1A95F14958E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11021:*:*:*:*:*:*", "matchCriteriaId": "180D47A1-946C-45DD-8C2D-7DA29B1EC3EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11022:*:*:*:*:*:*", "matchCriteriaId": "E19E394F-27B1-417D-9B49-CE4D8118B460", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11023:*:*:*:*:*:*", "matchCriteriaId": "22960AA4-29CA-4C83-B478-782E68A34501", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11024:*:*:*:*:*:*", "matchCriteriaId": "47658F40-53C9-4F8A-8BBA-D35C14C6D009", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11025:*:*:*:*:*:*", "matchCriteriaId": "89DE9DAA-9B7A-4017-81BF-67D4F4AC4BB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11026:*:*:*:*:*:*", "matchCriteriaId": "0A020B6D-2BEF-4926-9BFF-715295C774EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11027:*:*:*:*:*:*", "matchCriteriaId": "97ED6F11-68BF-4739-AF31-C30D90FC495D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11028:*:*:*:*:*:*", "matchCriteriaId": "85AD00BC-D04C-4FAE-AF25-DE54A17766BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11029:*:*:*:*:*:*", "matchCriteriaId": "FEE9569D-EE33-41ED-BC8F-6BA7A7BEA556", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11030:*:*:*:*:*:*", "matchCriteriaId": "97B0E48A-40E1-4D6B-8F9F-B853CC4FAB97", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11031:*:*:*:*:*:*", "matchCriteriaId": "B7903877-19E2-42D5-AEE5-85403FF8832C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11032:*:*:*:*:*:*", "matchCriteriaId": "FA281B1F-A412-43F5-86DA-FF40BF68FB93", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11033:*:*:*:*:*:*", "matchCriteriaId": "7DC67501-A294-4379-9C87-77B3F5D6A301", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11034:*:*:*:*:*:*", "matchCriteriaId": "9C0CDF99-23C5-44D4-A18D-375172E00CA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11035:*:*:*:*:*:*", "matchCriteriaId": "271B1FE2-3378-4A79-B283-4C83EC168163", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11036:*:*:*:*:*:*", "matchCriteriaId": "20554DBF-E1A1-403D-BE4B-FD0166F2BA25", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11037:*:*:*:*:*:*", "matchCriteriaId": "7171E1EF-3ECA-4724-B779-9EEF84ED76C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11038:*:*:*:*:*:*", "matchCriteriaId": "5883267A-37CA-4DB9-8645-6E75CB2D0354", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11039:*:*:*:*:*:*", "matchCriteriaId": "FB9D5CEE-B7EA-43F5-BD28-9219D98B08A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11040:*:*:*:*:*:*", "matchCriteriaId": "E976E46D-1DE5-4D8D-A280-49BF4B8EA40C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11041:*:*:*:*:*:*", "matchCriteriaId": "9B592BB0-7190-406E-B4BA-7D0F1684DEE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11042:*:*:*:*:*:*", "matchCriteriaId": "48C99BCD-AF5A-4AC2-A7E5-D015FB7D3075", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11043:*:*:*:*:*:*", "matchCriteriaId": "8F83E1E8-8183-4B37-8507-5804B9FC942F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11044:*:*:*:*:*:*", "matchCriteriaId": "69487D5D-6B1C-4279-8411-DEBA5813169C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11045:*:*:*:*:*:*", "matchCriteriaId": "EE09ADE2-1AD7-4D2D-BDBE-B5E1EBFE1D98", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11046:*:*:*:*:*:*", "matchCriteriaId": "FB384444-6E26-42AD-8410-288D1E79977C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11047:*:*:*:*:*:*", "matchCriteriaId": "B8FA336F-3E32-427E-B04D-081988E66433", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11048:*:*:*:*:*:*", "matchCriteriaId": "DA2859B9-E8DB-4E36-B37D-7ECD218E9ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11049:*:*:*:*:*:*", "matchCriteriaId": "EECAABA0-4DC6-44C7-B09F-E264EB770289", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11050:*:*:*:*:*:*", "matchCriteriaId": "DD446D71-F167-4E9E-B822-BEC1E674FA8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11051:*:*:*:*:*:*", "matchCriteriaId": "28C78C03-0715-4282-B85F-7B3B6E9B2A7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11052:*:*:*:*:*:*", "matchCriteriaId": "67F663AF-5723-4D5F-9374-644F4EAE856B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11053:*:*:*:*:*:*", "matchCriteriaId": "BC035AEF-6E20-4723-803D-17FEC8828457", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11054:*:*:*:*:*:*", "matchCriteriaId": "DA0A7F82-E048-48C6-B06E-3722DD063BF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11055:*:*:*:*:*:*", "matchCriteriaId": "5985A7A3-CD2A-4CBA-98B6-421CD6301190", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11056:*:*:*:*:*:*", "matchCriteriaId": "BFCDFFCB-CDF4-4141-8E3A-15EBD7FF27C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11057:*:*:*:*:*:*", "matchCriteriaId": "7A4958CA-BC75-4E57-9C1C-2950A89EFF4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11058:*:*:*:*:*:*", "matchCriteriaId": "C155336D-0DEA-4BE8-BC48-90BD63AB6297", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11059:*:*:*:*:*:*", "matchCriteriaId": "29BBD102-7AA3-4A3C-A514-AB0F5CE6BB78", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11060:*:*:*:*:*:*", "matchCriteriaId": "AE4C7C0E-B4D3-4A0E-AA95-ABA6897D302B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11061:*:*:*:*:*:*", "matchCriteriaId": "D825F2DA-912E-4CE5-9EF0-78FB9F8548C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11062:*:*:*:*:*:*", "matchCriteriaId": "EB53E599-C101-4E90-BB80-4D3D6578353F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11063:*:*:*:*:*:*", "matchCriteriaId": "63BEEE1E-83AC-4BAB-AE94-13E0DA5B48E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11064:*:*:*:*:*:*", "matchCriteriaId": "6D658AEC-C786-4CFF-88AF-7C0A59BA49F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11065:*:*:*:*:*:*", "matchCriteriaId": "5E5E2B3A-6085-48CE-A2B6-1B70F339FC23", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11066:*:*:*:*:*:*", "matchCriteriaId": "0D53C247-962E-4581-B157-9AF7027FE42A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11067:*:*:*:*:*:*", "matchCriteriaId": "4AC56936-4CDC-4BA6-9371-36A0B8BAD07D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11068:*:*:*:*:*:*", "matchCriteriaId": "99348C4B-DF97-4B3B-9FE1-2F2F252158E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11069:*:*:*:*:*:*", "matchCriteriaId": "37AD474F-4652-4A11-995D-81A239972207", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11070:*:*:*:*:*:*", "matchCriteriaId": "A755D7B3-6F85-4010-8345-C848498AE642", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11071:*:*:*:*:*:*", "matchCriteriaId": "281E0AF0-93D5-4111-A61A-D9EA1FFBF32A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11072:*:*:*:*:*:*", "matchCriteriaId": "9AC03AF6-B707-48B8-83D0-B1AEB1681360", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11073:*:*:*:*:*:*", "matchCriteriaId": "EA83615D-DBDC-4C07-ADBF-9DBD44F0A5F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11074:*:*:*:*:*:*", "matchCriteriaId": "202BE678-B406-491F-8429-2E30ED7961C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11075:*:*:*:*:*:*", "matchCriteriaId": "38D50534-92BF-4A20-A0B8-FA73074E51EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11076:*:*:*:*:*:*", "matchCriteriaId": "77A9F9EA-40EF-407D-A758-5162B806E4F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11077:*:*:*:*:*:*", "matchCriteriaId": "B6598674-73DE-4D2D-860C-B4C005C51F3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11078:*:*:*:*:*:*", "matchCriteriaId": "7A47F993-89F8-4D53-807B-B7E95422718D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11079:*:*:*:*:*:*", "matchCriteriaId": "A401E2B5-281A-41B5-B4E8-EE15B5B28B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11080:*:*:*:*:*:*", "matchCriteriaId": "C1B913F4-3AC0-4BCB-A9AC-0B7A1C29CBD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11081:*:*:*:*:*:*", "matchCriteriaId": "85FB043F-73BA-4397-A41A-39B7C79458AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11082:*:*:*:*:*:*", "matchCriteriaId": "BA43AF94-FEA9-461D-8DF6-B9A3E9FD60B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11083:*:*:*:*:*:*", "matchCriteriaId": "5CEA4C0E-F7F3-423C-B0B8-EC0BE02FDF25", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11084:*:*:*:*:*:*", "matchCriteriaId": "5759EE70-4B29-42B5-8C40-BF3391ADF489", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11085:*:*:*:*:*:*", "matchCriteriaId": "D42ABC2B-2E50-4F5E-82D1-B1ABDAD23877", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11086:*:*:*:*:*:*", "matchCriteriaId": "0E3EE11C-D410-4041-8E9D-0535938EE096", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11087:*:*:*:*:*:*", "matchCriteriaId": "BB9973AA-9D8C-411D-A601-CBAA375D2984", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11088:*:*:*:*:*:*", "matchCriteriaId": "BECB6E28-2EBE-4F60-B4D6-D997700853DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11089:*:*:*:*:*:*", "matchCriteriaId": "2EAAD574-262C-4B84-B7F6-BCF81AEC0247", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11090:*:*:*:*:*:*", "matchCriteriaId": "A6CF61CD-F04B-489E-9955-13183BAE4736", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11091:*:*:*:*:*:*", "matchCriteriaId": "A1ECE9A6-B129-4F4C-8BF2-99B0267C112A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11092:*:*:*:*:*:*", "matchCriteriaId": "BC891563-D5A7-43EE-805D-FC505B591FDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11093:*:*:*:*:*:*", "matchCriteriaId": "BA10BDC1-B039-4520-8E10-7DC9027D53B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11094:*:*:*:*:*:*", "matchCriteriaId": "6ED3E4A7-F1C2-4DBC-B726-0E912A485E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11095:*:*:*:*:*:*", "matchCriteriaId": "D904FD25-9D02-4928-BB18-4DE2B5E09E18", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11096:*:*:*:*:*:*", "matchCriteriaId": "2486CAC1-CE3D-4ADE-ACFB-7C99F9A0D06E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11097:*:*:*:*:*:*", "matchCriteriaId": "40E43160-AC56-42A8-B2DE-6F9D27DCD251", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11098:*:*:*:*:*:*", "matchCriteriaId": "861DA10E-BA65-4FF3-B42B-E163F290D43C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11099:*:*:*:*:*:*", "matchCriteriaId": "005E1759-83A5-4ED7-B5C9-A85D384EFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11100:*:*:*:*:*:*", "matchCriteriaId": "CA8BE3C6-AD7D-4330-AD8E-4BFA96F1D009", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11101:*:*:*:*:*:*", "matchCriteriaId": "1A86F1DC-67EC-4297-82A5-75963F7A3E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11102:*:*:*:*:*:*", "matchCriteriaId": "4309093D-11AE-4A60-AE1B-76A384DA9E21", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11103:*:*:*:*:*:*", "matchCriteriaId": "C1AB907F-5609-48AC-9540-BD73DDE04E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11104:*:*:*:*:*:*", "matchCriteriaId": "C037BFF3-DAD8-42C5-93A3-5C9A409F4D22", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11105:*:*:*:*:*:*", "matchCriteriaId": "03B2F51A-7988-4891-A708-DE88D9A7555B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11106:*:*:*:*:*:*", "matchCriteriaId": "DD2E69CE-3F18-4E08-BDD7-29C038B5938D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11107:*:*:*:*:*:*", "matchCriteriaId": "68EEDBA0-0860-460B-9825-C0456E74995A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11108:*:*:*:*:*:*", "matchCriteriaId": "EC40DF89-E2B3-47C1-A7E6-9E53F8C18089", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11109:*:*:*:*:*:*", "matchCriteriaId": "752E520A-492F-4CBD-BB96-36D8D51F7D87", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11110:*:*:*:*:*:*", "matchCriteriaId": "81D1AE83-A406-450D-8087-06022D542B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11111:*:*:*:*:*:*", "matchCriteriaId": "413B9737-B388-4E10-B93E-1BC31BCCF277", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11112:*:*:*:*:*:*", "matchCriteriaId": "100B5095-72F8-46F3-84E7-49068DA03C73", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11113:*:*:*:*:*:*", "matchCriteriaId": "1DDCCB14-3F10-41D6-A316-37C35E1324C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11114:*:*:*:*:*:*", "matchCriteriaId": "C053D615-4B9C-430F-BB8B-623FB6776341", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11115:*:*:*:*:*:*", "matchCriteriaId": "AA10A74B-3E40-49FE-97C7-3CD208C4D908", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11116:*:*:*:*:*:*", "matchCriteriaId": "EF34697F-DDF7-421B-B7B7-D8E530D49D27", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11117:*:*:*:*:*:*", "matchCriteriaId": "0C809FB2-31A2-4E69-A734-20E2B313EF82", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11118:*:*:*:*:*:*", "matchCriteriaId": "C4FEC52D-D79A-4477-946F-DCF06A6016A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11119:*:*:*:*:*:*", "matchCriteriaId": "769D6E3C-8344-4E6C-B9C9-51B85EEEE276", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11120:*:*:*:*:*:*", "matchCriteriaId": "AE6FB991-32B7-4A80-B59D-83BF39C84E76", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11121:*:*:*:*:*:*", "matchCriteriaId": "E78C106D-7DB4-4040-AB51-F1545C5BF802", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11122:*:*:*:*:*:*", "matchCriteriaId": "B91344E7-E7D6-4630-A787-5B03E4FEF319", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11123:*:*:*:*:*:*", "matchCriteriaId": "D4E3B5A2-CF17-46F8-AC6A-F29AD5F203A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11124:*:*:*:*:*:*", "matchCriteriaId": "4936E3D5-F1D7-4C50-A756-44A687D17561", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11125:*:*:*:*:*:*", "matchCriteriaId": "5170D6E8-E58D-40A1-869B-C2D932D40B54", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11126:*:*:*:*:*:*", "matchCriteriaId": "CD8B73CE-A4D5-4F35-8A1B-F5D6DE628C68", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11127:*:*:*:*:*:*", "matchCriteriaId": "B4C8A6E8-4775-493D-BB9A-2A9E2B1C622F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11128:*:*:*:*:*:*", "matchCriteriaId": "714EE42A-C829-4C68-8A3D-A84B5C43A7CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11129:*:*:*:*:*:*", "matchCriteriaId": "13EFC648-EFF1-4B77-A306-8BABC0FBC73E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11130:*:*:*:*:*:*", "matchCriteriaId": "6F121168-A92E-4A93-A55A-CB104A7C683C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11131:*:*:*:*:*:*", "matchCriteriaId": "34B2EEA7-02B1-4033-B075-75943C345B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11132:*:*:*:*:*:*", "matchCriteriaId": "02C057F9-6D08-42DA-91C1-8726A6DCD20D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11133:*:*:*:*:*:*", "matchCriteriaId": "3B4E46D3-0ADF-4489-AD29-4DBA857F32F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11134:*:*:*:*:*:*", "matchCriteriaId": "18F3345F-69BB-4583-94AE-B857E0140C7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11135:*:*:*:*:*:*", "matchCriteriaId": "0B70C566-A88B-4302-80C0-4B5CD3AA434B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11136:*:*:*:*:*:*", "matchCriteriaId": "C6CB200E-2BD1-49C3-9E73-FF14061DEA80", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11137:*:*:*:*:*:*", "matchCriteriaId": "B940D33E-D5E2-480F-8BD6-E87945211A3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11138:*:*:*:*:*:*", "matchCriteriaId": "9B7AF6A9-AF61-4082-B56D-5A3B9653DC49", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11139:*:*:*:*:*:*", "matchCriteriaId": "6AEB4102-DD5D-4BC2-8391-EA702D91080F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11140:*:*:*:*:*:*", "matchCriteriaId": "3D115F9C-1F24-49DA-A0FB-7A1E992D7DC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11141:*:*:*:*:*:*", "matchCriteriaId": "E0AFB8FC-4E5D-47CC-88A5-A3DAE750E01F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11142:*:*:*:*:*:*", "matchCriteriaId": "EBE39C82-EC7E-4183-B24A-64451BE87C73", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11143:*:*:*:*:*:*", "matchCriteriaId": "58AB218F-2F5E-4758-9F44-09B8CC179E57", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11144:*:*:*:*:*:*", "matchCriteriaId": "FB19CF5D-12A3-484F-B9A0-A18BB21816FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11145:*:*:*:*:*:*", "matchCriteriaId": "25E16F06-B5FE-4388-82EF-045F2ED335AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11146:*:*:*:*:*:*", "matchCriteriaId": "30180C40-5C76-41BC-88B1-8FE29E3A150E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11147:*:*:*:*:*:*", "matchCriteriaId": "C469855A-B653-4C51-B795-75D10D16831B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11148:*:*:*:*:*:*", "matchCriteriaId": "AC1D1E59-C28B-4010-956A-0A010988D6D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11149:*:*:*:*:*:*", "matchCriteriaId": "98D4E4DB-88F1-4461-AB25-7E2D0D950669", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11150:*:*:*:*:*:*", "matchCriteriaId": "3AD19664-830B-4864-8C12-3167D7CAE4DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11151:*:*:*:*:*:*", "matchCriteriaId": "0DABF116-24CD-4359-A8A6-2552BD45441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11152:*:*:*:*:*:*", "matchCriteriaId": "8CE9CD3F-F96F-4608-90FA-053E0E586E3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11153:*:*:*:*:*:*", "matchCriteriaId": "68B01F08-611E-4116-BB39-4E1A2511C480", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11154:*:*:*:*:*:*", "matchCriteriaId": "3DE4CA2A-591A-4E0C-8CFA-1DC25C840F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11155:*:*:*:*:*:*", "matchCriteriaId": "CCB49B03-166D-40C7-863B-8CE21F9729EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11156:*:*:*:*:*:*", "matchCriteriaId": "7ADF6584-6340-455E-BA4B-1E44F9E206F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11157:*:*:*:*:*:*", "matchCriteriaId": "5E4E3181-6920-4EFC-B4BB-E723C18A31FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11158:*:*:*:*:*:*", "matchCriteriaId": "4FE93EB6-3D0B-4F3A-B020-66A809A46731", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11159:*:*:*:*:*:*", "matchCriteriaId": "C71BF6D9-D126-4E7A-8B8E-9103AB047225", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11160:*:*:*:*:*:*", "matchCriteriaId": "8F993DE4-6300-47D7-953B-B02F6C2BABA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11161:*:*:*:*:*:*", "matchCriteriaId": "6CF834D0-D7EE-44E6-AEFA-75E85B543427", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11162:*:*:*:*:*:*", "matchCriteriaId": "143C9A9A-3C62-4B0F-AE8A-69130F30F83C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11163:*:*:*:*:*:*", "matchCriteriaId": "A6C2BDFE-2FDC-43D2-9E6E-368719AE842E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11164:*:*:*:*:*:*", "matchCriteriaId": "1F109744-0EAA-48DF-BCF6-1153A8932D0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11165:*:*:*:*:*:*", "matchCriteriaId": "BB789200-6FD8-4EE1-8162-C0DFBEF7A713", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11166:*:*:*:*:*:*", "matchCriteriaId": "A34137E2-1FD6-472A-AFD2-1E7C2D9C21DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11167:*:*:*:*:*:*", "matchCriteriaId": "BD3B6BAB-E215-4F09-AB1F-18E2D80A7D0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11168:*:*:*:*:*:*", "matchCriteriaId": "A96D74AC-09BA-469B-B440-9F664C917B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11169:*:*:*:*:*:*", "matchCriteriaId": "5EB4A273-8DFB-48F9-BD1B-57B6F25051BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11170:*:*:*:*:*:*", "matchCriteriaId": "73873EB4-828E-4EC8-8ABB-1A3AE30D3291", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11171:*:*:*:*:*:*", "matchCriteriaId": "03465343-9475-401E-AF61-3250876783F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11172:*:*:*:*:*:*", "matchCriteriaId": "07EBEB03-858F-4A90-AAC3-4C385D4C6D7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11173:*:*:*:*:*:*", "matchCriteriaId": "0911C083-17D3-40EF-B1D3-CEAC2CA4475B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11174:*:*:*:*:*:*", "matchCriteriaId": "7DC620CD-299A-422F-ABF5-504C15251B4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11175:*:*:*:*:*:*", "matchCriteriaId": "E9977C76-76D4-43A3-8F47-14315EEBDC98", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11176:*:*:*:*:*:*", "matchCriteriaId": "4E75C26B-71A6-4B7C-A682-B76DA073185B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11177:*:*:*:*:*:*", "matchCriteriaId": "77EF9FF4-2452-48F3-99EE-20C5358AEF5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11178:*:*:*:*:*:*", "matchCriteriaId": "78E7676D-F4DE-4BD1-8992-E005A3EEC208", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11179:*:*:*:*:*:*", "matchCriteriaId": "14B2FA08-0141-4BB4-887C-DFE5161DE8F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11180:*:*:*:*:*:*", "matchCriteriaId": "32CB1543-1DBE-481C-BB94-64B903CBCAB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11181:*:*:*:*:*:*", "matchCriteriaId": "82E3F2C4-1A54-47FE-AD06-A55AB99A3726", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11182:*:*:*:*:*:*", "matchCriteriaId": "C9FCBEC6-1AB5-4FC5-8F97-6ABE45B607C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11183:*:*:*:*:*:*", "matchCriteriaId": "AC70103E-6D71-4A1D-9B9B-2C95E92AA793", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11184:*:*:*:*:*:*", "matchCriteriaId": "ABC26FD9-0755-4FE6-955A-973202F00754", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11185:*:*:*:*:*:*", "matchCriteriaId": "39182F5E-F8C9-4DA5-88FE-86C6BD14F792", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11186:*:*:*:*:*:*", "matchCriteriaId": "F2300621-D818-4AFF-8B7B-3885D5AD1C7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11187:*:*:*:*:*:*", "matchCriteriaId": "66CF7972-40FC-4B2A-A32E-405C3EF3E542", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11188:*:*:*:*:*:*", "matchCriteriaId": "A643C7E9-1EAB-4E9D-B87B-AC1D6DC6AC83", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11189:*:*:*:*:*:*", "matchCriteriaId": "32ECA788-0770-4A01-BA65-50034E60FC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11190:*:*:*:*:*:*", "matchCriteriaId": "97B1FDC0-4597-469A-B0B1-60152F9F10B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11191:*:*:*:*:*:*", "matchCriteriaId": "2157A4DA-7C5B-4330-976D-34C80E0E7B45", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11192:*:*:*:*:*:*", "matchCriteriaId": "15AF720B-42D3-4D80-B828-D1E51DFE8245", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11193:*:*:*:*:*:*", "matchCriteriaId": "8802BC0D-1B98-4D0C-803E-5E774CF27919", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11194:*:*:*:*:*:*", "matchCriteriaId": "5013E52E-DAE3-4E7C-B44B-D24347FA5E96", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11195:*:*:*:*:*:*", "matchCriteriaId": "F49A00E6-0C84-43C6-B89B-2741B2F0E268", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11196:*:*:*:*:*:*", "matchCriteriaId": "666A6266-67E9-411D-9193-8B4DED121AC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11197:*:*:*:*:*:*", "matchCriteriaId": "36A44706-5316-4046-BCB5-36CEC95C9B43", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11198:*:*:*:*:*:*", "matchCriteriaId": "3E75DCD0-E196-44A2-94B1-9EE37BE0E8F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11199:*:*:*:*:*:*", "matchCriteriaId": "50821FDC-1D13-4346-ABA8-AA6AB512CD4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11200:*:*:*:*:*:*", "matchCriteriaId": "EC9E672D-27BB-46C4-A8CD-DBD7E0E2E3A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11201:*:*:*:*:*:*", "matchCriteriaId": "D3D407B8-5B97-4F7E-BB03-7E4F58C5FBDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11202:*:*:*:*:*:*", "matchCriteriaId": "E9B92087-B495-4B72-B4B1-D9F900C8056B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11203:*:*:*:*:*:*", "matchCriteriaId": "D2FA7418-4337-4E13-87F6-F6ECFBD1E94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11204:*:*:*:*:*:*", "matchCriteriaId": "DD9C445E-B79D-43A0-841D-058961AF6D26", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11205:*:*:*:*:*:*", "matchCriteriaId": "92DC0416-3F71-4D59-8275-1CAB0E62FB36", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11206:*:*:*:*:*:*", "matchCriteriaId": "DB6604EE-6F4F-478C-BE55-EB84DBC9E414", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11207:*:*:*:*:*:*", "matchCriteriaId": "2CAF6F35-9C5B-459E-9D73-3A4603C576E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11208:*:*:*:*:*:*", "matchCriteriaId": "98C427FE-536F-414A-B529-6C80BB4C931A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11209:*:*:*:*:*:*", "matchCriteriaId": "ABAB24B0-FB4A-402A-9D3D-A490FA934C09", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11210:*:*:*:*:*:*", "matchCriteriaId": "5D182E3E-1B45-40C0-B2A3-ED66B101492E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11211:*:*:*:*:*:*", "matchCriteriaId": "71ACF7E5-3928-464B-BF23-550BCE24BCD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11212:*:*:*:*:*:*", "matchCriteriaId": "3EF9EF21-9638-4BA6-AE44-4D25611C8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11213:*:*:*:*:*:*", "matchCriteriaId": "729CB2EA-9D26-4DCA-8FDE-DD645F38DEDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11214:*:*:*:*:*:*", "matchCriteriaId": "87484194-C992-4CFE-8E2D-064FB59F429E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11215:*:*:*:*:*:*", "matchCriteriaId": "731057A7-0413-4B2D-A8FC-4E73D3D954EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11216:*:*:*:*:*:*", "matchCriteriaId": "CC5BC79C-5507-4B11-B304-17E1AAF2099D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11217:*:*:*:*:*:*", "matchCriteriaId": "2401C1F4-9F6F-43CA-B9FB-AADCB8F0BDAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11218:*:*:*:*:*:*", "matchCriteriaId": "9B51DC0D-3460-4F53-9DFF-9B5E6A45EA9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11219:*:*:*:*:*:*", "matchCriteriaId": "4F9A3807-632C-466A-BB0D-694D360AA7A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11220:*:*:*:*:*:*", "matchCriteriaId": "AC6E4B16-F672-48B9-ABF1-AF6E1DC76997", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11221:*:*:*:*:*:*", "matchCriteriaId": "75D1A674-E11B-4DBF-996B-579C3DF8B9E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11222:*:*:*:*:*:*", "matchCriteriaId": "0029D917-AD21-4EAD-8464-55A48A4DB42F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11223:*:*:*:*:*:*", "matchCriteriaId": "5A33CC58-FC52-4FB9-8DF8-9ED4B4503C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11224:*:*:*:*:*:*", "matchCriteriaId": "E0A7E3F6-CA03-457B-A00C-C1580BD20565", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11225:*:*:*:*:*:*", "matchCriteriaId": "60FE3624-DB10-4AB3-A8B6-F9024A2B188E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11226:*:*:*:*:*:*", "matchCriteriaId": "7CFBF81D-FA6A-4A35-9007-A8FD29E496CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11227:*:*:*:*:*:*", "matchCriteriaId": "925A155D-15CE-4116-A340-18552B053187", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11228:*:*:*:*:*:*", "matchCriteriaId": "22E1B7B7-B06E-42F9-86A2-B6538F2A17DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11229:*:*:*:*:*:*", "matchCriteriaId": "B138D1D8-1563-4A1A-B45E-E90B7BBA4090", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11230:*:*:*:*:*:*", "matchCriteriaId": "1D384F07-C1FE-45DA-85C3-00688D0847D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11231:*:*:*:*:*:*", "matchCriteriaId": "3AEA35F4-197A-4355-8DB5-E6A381F5F30C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11232:*:*:*:*:*:*", "matchCriteriaId": "371D5877-C584-49BC-860F-8370B3D10BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11233:*:*:*:*:*:*", "matchCriteriaId": "A66C262C-21FA-4557-B69A-938810DEAFA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11234:*:*:*:*:*:*", "matchCriteriaId": "2C31685D-63EA-4BD4-B053-5D0863D1E519", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11235:*:*:*:*:*:*", "matchCriteriaId": "A35FF493-0F7A-4BA6-BA38-6F21E5EAB38C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11236:*:*:*:*:*:*", "matchCriteriaId": "D35029F6-481F-4396-8C75-A6C0311CD5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11237:*:*:*:*:*:*", "matchCriteriaId": "382F3F77-6AA7-4C9E-9027-51F37E5DDA8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11238:*:*:*:*:*:*", "matchCriteriaId": "7CAAF6AA-0E47-4B77-9D1D-C6BEEF99F356", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11239:*:*:*:*:*:*", "matchCriteriaId": "C5BB48BB-9EE7-4A93-9508-3D14E0241CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11240:*:*:*:*:*:*", "matchCriteriaId": "A104C053-5786-4BA3-BEE6-A89581FEE129", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11241:*:*:*:*:*:*", "matchCriteriaId": "B31EBB9F-DF29-4B30-8ED0-689AC63CA519", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11242:*:*:*:*:*:*", "matchCriteriaId": "8763B577-90F3-4529-BA33-D06B4252850D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11243:*:*:*:*:*:*", "matchCriteriaId": "B917D1BA-BEF4-44D6-A038-52805E0214EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11244:*:*:*:*:*:*", "matchCriteriaId": "8B1D70F2-5D3A-466A-97DE-EECE46B0A711", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11245:*:*:*:*:*:*", "matchCriteriaId": "D2FC8836-A62B-4E7B-9615-86329CD882A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11246:*:*:*:*:*:*", "matchCriteriaId": "E11B99F3-F73C-4344-BFC8-AF567F6F32A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11247:*:*:*:*:*:*", "matchCriteriaId": "43C0B464-E7A8-4EFF-B9B4-E74B540B41B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11248:*:*:*:*:*:*", "matchCriteriaId": "1E6B8818-9D3C-452E-9AC6-DE374F45E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11249:*:*:*:*:*:*", "matchCriteriaId": "263A2E74-B603-495C-ACFB-FDF172953BD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11250:*:*:*:*:*:*", "matchCriteriaId": "AC66E35A-D6B8-4927-99BC-E603436F7C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11251:*:*:*:*:*:*", "matchCriteriaId": "79FC3C8E-B48E-4AAB-A3E3-31E8090EC050", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11252:*:*:*:*:*:*", "matchCriteriaId": "0F0F4492-A822-49C7-B08B-1EAA2F31EA97", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11253:*:*:*:*:*:*", "matchCriteriaId": "C022C474-FA05-448B-BDBD-8DE75B15A1FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11254:*:*:*:*:*:*", "matchCriteriaId": "412EABB1-2EE4-4361-8B96-5F6A4816537C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11255:*:*:*:*:*:*", "matchCriteriaId": "CE1B075B-81FC-4604-8BDF-911B5CE8500C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11256:*:*:*:*:*:*", "matchCriteriaId": "5C2BA057-2410-4416-8E83-F78DA7E8A064", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11257:*:*:*:*:*:*", "matchCriteriaId": "17D85901-B869-4120-9C34-713892DF44E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11258:*:*:*:*:*:*", "matchCriteriaId": "60E68C34-F4DE-4966-B568-158C33783C4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11259:*:*:*:*:*:*", "matchCriteriaId": "D639258B-30E4-4E4F-B75A-71F9B45B4B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11260:*:*:*:*:*:*", "matchCriteriaId": "8DAD580F-FAA6-4A50-B1E1-0E27BAF1DA5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11261:*:*:*:*:*:*", "matchCriteriaId": "C45CB1DB-248C-4A7D-B020-B2096E159530", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11262:*:*:*:*:*:*", "matchCriteriaId": "0CBFD8D1-0301-43BE-A24A-6586A38C3E8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11263:*:*:*:*:*:*", "matchCriteriaId": "CC066EB8-D5B8-4B42-A4D9-38CA126F1145", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11264:*:*:*:*:*:*", "matchCriteriaId": "8B4F82DF-0101-4507-B200-087F45947E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11265:*:*:*:*:*:*", "matchCriteriaId": "CCCBBCB5-DE25-4A1E-9AAF-503C61380145", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11266:*:*:*:*:*:*", "matchCriteriaId": "F5C499D3-61B5-4317-8C81-9966073E9AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11267:*:*:*:*:*:*", "matchCriteriaId": "376595D7-E93F-4069-9DD7-75BCA603AA9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11268:*:*:*:*:*:*", "matchCriteriaId": "88443C9A-3AB8-4826-8C4E-C28A5EB768C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11269:*:*:*:*:*:*", "matchCriteriaId": "E0F9C2DE-E81C-4039-81C0-FE5000D7122B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11270:*:*:*:*:*:*", "matchCriteriaId": "6005312D-F02D-4680-A7DD-59D7BE3013E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11271:*:*:*:*:*:*", "matchCriteriaId": "3E7E2109-4E1B-455D-A3A1-062076F5DABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11272:*:*:*:*:*:*", "matchCriteriaId": "19D7AD64-3562-4D3A-93CC-7CAA1FEB8EB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11273:*:*:*:*:*:*", "matchCriteriaId": "673C7311-0EF1-4022-9E23-5743931CE344", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11274:*:*:*:*:*:*", "matchCriteriaId": "A6D2F254-F412-40FA-A51B-EB7E297948C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11275:*:*:*:*:*:*", "matchCriteriaId": "94E6D200-E206-4E2A-9C02-2CFE626A6AA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11276:*:*:*:*:*:*", "matchCriteriaId": "091FEB28-9734-49E8-8127-AED66F816CF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11277:*:*:*:*:*:*", "matchCriteriaId": "38419128-7BC6-466F-A614-D37BD837DBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11278:*:*:*:*:*:*", "matchCriteriaId": "B90A92E5-BA0D-40E7-8ACA-860C21DD2D1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11279:*:*:*:*:*:*", "matchCriteriaId": "3DDB5511-9B49-4EE3-89DB-60DCC21953F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11280:*:*:*:*:*:*", "matchCriteriaId": "57344CDC-8198-4DC6-88BA-E1B645490452", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11281:*:*:*:*:*:*", "matchCriteriaId": "651A3487-389F-4BA7-9B64-CDE35F1E3AD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11282:*:*:*:*:*:*", "matchCriteriaId": "C8D72210-1F0A-4632-BE00-190E1F09A92D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11283:*:*:*:*:*:*", "matchCriteriaId": "55B845D5-50F6-4A96-9DA8-CDEFD811BA05", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11284:*:*:*:*:*:*", "matchCriteriaId": "E5A79CB2-945E-4E66-A15D-B4F8FA4998D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11285:*:*:*:*:*:*", "matchCriteriaId": "B8B572D9-45B5-428B-A453-A06B35B037B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11286:*:*:*:*:*:*", "matchCriteriaId": "E5B0A305-D466-4EDA-8790-B7211F7B8C36", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11287:*:*:*:*:*:*", "matchCriteriaId": "5572092D-0BF6-405A-801C-D743A10B00C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11288:*:*:*:*:*:*", "matchCriteriaId": "77C14641-99A7-43AC-A00A-07E90743B296", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11289:*:*:*:*:*:*", "matchCriteriaId": "C3CC4B09-6BE9-4058-8010-DB86A5D188AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11290:*:*:*:*:*:*", "matchCriteriaId": "C7D380E3-05A3-4510-BE19-0DDBC273D3AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11291:*:*:*:*:*:*", "matchCriteriaId": "99A6E444-A171-4195-B9A3-7096E1379220", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11292:*:*:*:*:*:*", "matchCriteriaId": "2DF0C4C0-3676-4168-96B4-81B20B4096CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11293:*:*:*:*:*:*", "matchCriteriaId": "A8C27691-2710-4324-A02B-3F02A6E4FE3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11294:*:*:*:*:*:*", "matchCriteriaId": "CD702D4F-AC26-4651-BFCA-8A068A1CEC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11295:*:*:*:*:*:*", "matchCriteriaId": "E308595D-9287-4067-B206-116D98D3D666", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11296:*:*:*:*:*:*", "matchCriteriaId": "2526E0C3-D839-4B8A-B6DA-E6E75293D545", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11297:*:*:*:*:*:*", "matchCriteriaId": "B4F74249-A5C6-4277-A569-F1026DEF336E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11298:*:*:*:*:*:*", "matchCriteriaId": "5D5A867B-DD73-4D66-8478-DD838653E4F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11299:*:*:*:*:*:*", "matchCriteriaId": "08B53FE1-3EF5-4038-ABAB-44272427CEC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11300:*:*:*:*:*:*", "matchCriteriaId": "1C1F7A47-E0F5-46AD-86A4-9C0F31ED0A3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11301:*:*:*:*:*:*", "matchCriteriaId": "DC16CA5B-29AD-4676-8269-C7EFC7177ABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11302:*:*:*:*:*:*", "matchCriteriaId": "B145C9A3-5ABD-4F10-A1B8-49D239616E54", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11303:*:*:*:*:*:*", "matchCriteriaId": "98A006A4-57F0-4C52-843C-0C2AF03708F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11304:*:*:*:*:*:*", "matchCriteriaId": "4149E366-7E12-40AF-85DB-E3D1F901B229", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11305:*:*:*:*:*:*", "matchCriteriaId": "23F9E75B-5745-47F1-89F1-8BF4FD6736AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11306:*:*:*:*:*:*", "matchCriteriaId": "9E11F24F-0384-4069-AD39-2110B5C3B74A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11307:*:*:*:*:*:*", "matchCriteriaId": "F6AFDEE5-96AC-4164-9396-B483E2007809", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11308:*:*:*:*:*:*", "matchCriteriaId": "B87D483C-85FB-4CE3-8A5D-8D77631B97ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11309:*:*:*:*:*:*", "matchCriteriaId": "11B7EEC7-828B-4018-83E6-8F632FE684E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11310:*:*:*:*:*:*", "matchCriteriaId": "874AC622-CE73-4D7E-B8AA-B110489A9E60", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11311:*:*:*:*:*:*", "matchCriteriaId": "635DF698-A65D-4380-98E9-CE5C08002782", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11312:*:*:*:*:*:*", "matchCriteriaId": "0D0F2B12-0F51-46DB-8521-8215FA93B894", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11313:*:*:*:*:*:*", "matchCriteriaId": "16BC65A1-25B8-414C-B424-C8F1B18AA242", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11314:*:*:*:*:*:*", "matchCriteriaId": "872792FF-B891-4D2B-A9F8-67FF5AAEF34B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11315:*:*:*:*:*:*", "matchCriteriaId": "2F303F75-31D4-4041-8B5C-EA400C073BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11316:*:*:*:*:*:*", "matchCriteriaId": "3D0A6392-4D31-450E-A3A8-7193579D4864", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11317:*:*:*:*:*:*", "matchCriteriaId": "CF91AA62-E34A-4273-9A59-E023B1A5DEAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11318:*:*:*:*:*:*", "matchCriteriaId": "3E906A87-E528-451F-9C11-9D98D861DE78", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11319:*:*:*:*:*:*", "matchCriteriaId": "7161D6E2-9EB5-4DFE-B617-B35FD3AC29A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11320:*:*:*:*:*:*", "matchCriteriaId": "60B2EE09-DEC5-4AE5-966A-AF0726355069", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11321:*:*:*:*:*:*", "matchCriteriaId": "94595AD0-552C-4B6A-9084-C0D6C7B1150E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11322:*:*:*:*:*:*", "matchCriteriaId": "D1C86211-1464-46E6-901D-C7D0D8D41005", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11323:*:*:*:*:*:*", "matchCriteriaId": "B8BF3AA2-E4A1-4C7D-964E-7ECC792C5B38", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11324:*:*:*:*:*:*", "matchCriteriaId": "46C583BF-B993-4BD9-BA57-FBDAFE9C193E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11325:*:*:*:*:*:*", "matchCriteriaId": "500943DD-4428-47E5-A579-7B9B3B252E8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11326:*:*:*:*:*:*", "matchCriteriaId": "6F7DAF90-D16A-49F1-89B7-00FAEBA72893", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11327:*:*:*:*:*:*", "matchCriteriaId": "A0F02BC0-86A4-45ED-BD84-1172669839E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11328:*:*:*:*:*:*", "matchCriteriaId": "9130A3C0-6FF1-4A75-86F5-78B2E04480CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11329:*:*:*:*:*:*", "matchCriteriaId": "274F442F-4513-4E23-ADD4-72A8CADBEA11", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11330:*:*:*:*:*:*", "matchCriteriaId": "C3893A8A-04C5-430B-B1A6-1C927CA4276E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11331:*:*:*:*:*:*", "matchCriteriaId": "4D67B8DB-459F-4F57-86D4-13C9787A3DDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11332:*:*:*:*:*:*", "matchCriteriaId": "172028C0-9C13-414E-A3E2-168C57F04B2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11333:*:*:*:*:*:*", "matchCriteriaId": "527618F9-F40B-493A-B29D-6E6D77BA8417", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11334:*:*:*:*:*:*", "matchCriteriaId": "64FD1FCE-1452-40B3-91AB-57CF3E07EBAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11335:*:*:*:*:*:*", "matchCriteriaId": "5D622D99-13DC-4A85-9E01-C93908D70B5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11336:*:*:*:*:*:*", "matchCriteriaId": "CE031FEC-4DB1-4EBD-992B-21D6B274BCC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11337:*:*:*:*:*:*", "matchCriteriaId": "03307106-6AD4-407A-8665-6224829C8FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11338:*:*:*:*:*:*", "matchCriteriaId": "95F7AF12-9E28-416C-90E0-2D8D56676EA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11339:*:*:*:*:*:*", "matchCriteriaId": "200A4DFF-55FF-4F1A-97CE-02D58324D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11340:*:*:*:*:*:*", "matchCriteriaId": "3A57916B-85F6-4541-A15B-9E93C42FC4DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11341:*:*:*:*:*:*", "matchCriteriaId": "EB26A92A-CA82-48F9-85B1-8423E1D3E232", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11342:*:*:*:*:*:*", "matchCriteriaId": "09EFA9E5-8E17-44C7-97B0-C14157D6A560", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11343:*:*:*:*:*:*", "matchCriteriaId": "DA089BD5-7913-4273-820C-5A47AB2FDAE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11344:*:*:*:*:*:*", "matchCriteriaId": "0E1712D4-0A62-481D-AC8D-843359E8556D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11345:*:*:*:*:*:*", "matchCriteriaId": "54EE7C51-8D63-49F1-90DF-C42883F24601", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11346:*:*:*:*:*:*", "matchCriteriaId": "F47ABF6A-0B14-47ED-9F0F-5594ED983FBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11347:*:*:*:*:*:*", "matchCriteriaId": "72433EDE-CED9-4942-BDA9-430DE2EFCF06", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11348:*:*:*:*:*:*", "matchCriteriaId": "4045E958-0EA4-45CC-BD04-F30BAFAE331C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11349:*:*:*:*:*:*", "matchCriteriaId": "1E5A9EB3-85D5-41D7-90EE-392CBA9F5E01", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11350:*:*:*:*:*:*", "matchCriteriaId": "8713F521-A144-485B-A0F0-7E7A5BD32346", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11351:*:*:*:*:*:*", "matchCriteriaId": "EBCDDBE4-83CC-4C52-9B71-FDCE6DD0CE99", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11352:*:*:*:*:*:*", "matchCriteriaId": "5133B5E1-F914-456E-9332-4287169C7331", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11353:*:*:*:*:*:*", "matchCriteriaId": "8E573702-16DF-480A-AC5B-69652F29976D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11354:*:*:*:*:*:*", "matchCriteriaId": "AC4E40F7-6F88-4D75-8C42-E1B1F22A9845", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11355:*:*:*:*:*:*", "matchCriteriaId": "CDD93127-9A57-433A-A192-0E8269A01CC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11356:*:*:*:*:*:*", "matchCriteriaId": "0EE74E71-AE7A-4363-9EE3-C53105603F05", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11357:*:*:*:*:*:*", "matchCriteriaId": "D3157665-8AC7-4157-BFF9-825AD72FEBF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11358:*:*:*:*:*:*", "matchCriteriaId": "8080D77E-B020-46D1-BA9B-6BBF3F6C3CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11359:*:*:*:*:*:*", "matchCriteriaId": "77D4A2DD-404A-4DD0-9859-1AB7CA1489C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11360:*:*:*:*:*:*", "matchCriteriaId": "45BFBDC5-7921-43A0-A9EA-77DBD8E9B257", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11361:*:*:*:*:*:*", "matchCriteriaId": "8C58EFA3-1AC5-43E0-AAA9-395F862B9CD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11362:*:*:*:*:*:*", "matchCriteriaId": "F435F020-961E-465F-BF74-F07124A65EEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11363:*:*:*:*:*:*", "matchCriteriaId": "453BB5B9-BA18-48F2-B85A-40DAF0302BBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11364:*:*:*:*:*:*", "matchCriteriaId": "A9BC2B66-CB1B-4774-8A8F-970CED0F1CC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11365:*:*:*:*:*:*", "matchCriteriaId": "42B94D6D-04D5-4834-A689-AC687F6D68B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11366:*:*:*:*:*:*", "matchCriteriaId": "2135F30F-A232-403C-AE08-8BD249D80229", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11367:*:*:*:*:*:*", "matchCriteriaId": "FB970124-560C-4D42-BF57-9AF17993A2B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11368:*:*:*:*:*:*", "matchCriteriaId": "50DE399D-E4F9-495D-AC76-ADBCF15F7B64", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11369:*:*:*:*:*:*", "matchCriteriaId": "CA434089-C7E1-4478-B57A-AD1EFDBC5B5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11370:*:*:*:*:*:*", "matchCriteriaId": "0F9C4E76-98A6-4E5B-9418-CE132E85A489", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11371:*:*:*:*:*:*", "matchCriteriaId": "0CB8C71A-859C-4DD3-A006-8F8D9D3F6D9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11372:*:*:*:*:*:*", "matchCriteriaId": "05BF9FCE-23C4-45B9-B4B5-BC0242FA4D2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11373:*:*:*:*:*:*", "matchCriteriaId": "FB6FCC82-5669-410B-83AF-69A97CDC84E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11374:*:*:*:*:*:*", "matchCriteriaId": "7DD498A8-3997-467E-8E8F-DC0C76244082", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11375:*:*:*:*:*:*", "matchCriteriaId": "D1A8D799-ED4C-43E9-81B9-70BFFCD53268", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11376:*:*:*:*:*:*", "matchCriteriaId": "73E946F3-19CB-4350-88F0-CBE0E79AC8D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11377:*:*:*:*:*:*", "matchCriteriaId": "A1E003DE-B9A0-422A-A88A-2AD77064596F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11378:*:*:*:*:*:*", "matchCriteriaId": "601FB219-7C5F-42DA-B9E7-808BAA9B2BB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11379:*:*:*:*:*:*", "matchCriteriaId": "491D47D4-1168-415F-8D1D-857B55F3AD9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11380:*:*:*:*:*:*", "matchCriteriaId": "28AA464D-72CE-431D-AC4D-41479FE0E838", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11381:*:*:*:*:*:*", "matchCriteriaId": "58291793-01B8-497B-9D73-EDD48B7FAB44", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11382:*:*:*:*:*:*", "matchCriteriaId": "42C944C1-3958-4B66-8387-0187F130AF40", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11383:*:*:*:*:*:*", "matchCriteriaId": "CF46042D-B37F-47BB-9615-7DF4734DC47B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11384:*:*:*:*:*:*", "matchCriteriaId": "9AEBFC17-9CD4-4E4C-BA65-7F35DC2347BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11385:*:*:*:*:*:*", "matchCriteriaId": "B0E96224-6122-4DE5-842E-441264EA13EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11386:*:*:*:*:*:*", "matchCriteriaId": "9EAF5AA5-E37A-4A7C-A9C2-56F5A63ADAD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11387:*:*:*:*:*:*", "matchCriteriaId": "DD618A66-CF8C-4541-A89A-F4DAEC801C69", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11388:*:*:*:*:*:*", "matchCriteriaId": "016B3746-11F6-41FD-B269-8936B75DF3FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11389:*:*:*:*:*:*", "matchCriteriaId": "5F407BBA-68C5-40B3-BFD7-E6E85E72BF40", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11390:*:*:*:*:*:*", "matchCriteriaId": "DB038A24-99C9-4E51-830A-43C1C61AE5D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11391:*:*:*:*:*:*", "matchCriteriaId": "D26DEB2F-CD55-4572-B7D9-BE5136BAD417", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11392:*:*:*:*:*:*", "matchCriteriaId": "BB16F977-6785-40AF-8A9D-D14EDE10D6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11393:*:*:*:*:*:*", "matchCriteriaId": "2C861AD7-9F32-4BC0-9B52-55D9AB253A9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11394:*:*:*:*:*:*", "matchCriteriaId": "3505A1CE-1B2C-4F7A-B9BE-7AD06E4FFAE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11395:*:*:*:*:*:*", "matchCriteriaId": "A77878B7-B7B4-46D6-AB57-A1DDE9B5C3F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11396:*:*:*:*:*:*", "matchCriteriaId": "40413922-E4F7-4508-BB1E-F1E60A6CBEF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11397:*:*:*:*:*:*", "matchCriteriaId": "346D3539-4793-42B9-8E40-CC8026A85825", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11398:*:*:*:*:*:*", "matchCriteriaId": "5549796C-B42F-464A-B173-A165E630017B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11399:*:*:*:*:*:*", "matchCriteriaId": "0639F2C1-C9F6-4BD9-ACEE-6DC59AE8A81E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11400:*:*:*:*:*:*", "matchCriteriaId": "DE9A8D6B-F3BE-4072-8F28-4CBCEC001BE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11401:*:*:*:*:*:*", "matchCriteriaId": "7B306C36-795E-4E04-AACD-0784CF91B307", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11402:*:*:*:*:*:*", "matchCriteriaId": "8AA0691E-A51B-4A65-92BC-EF6B35479F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11403:*:*:*:*:*:*", "matchCriteriaId": "4F2BBAE1-78EC-4D6F-8028-4E598A748952", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11404:*:*:*:*:*:*", "matchCriteriaId": "C0DD805A-5086-4627-B478-0DAB627EF1F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11405:*:*:*:*:*:*", "matchCriteriaId": "39156C60-7E90-4119-B485-09166C35EC0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11406:*:*:*:*:*:*", "matchCriteriaId": "C08900D7-5BC2-4BD8-AC25-55E6584DC907", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11407:*:*:*:*:*:*", "matchCriteriaId": "77FB0696-F734-420A-BD08-F1ED9C4B3202", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11408:*:*:*:*:*:*", "matchCriteriaId": "AD8A7515-1CDA-4A28-ABE0-368ADED2A3CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11409:*:*:*:*:*:*", "matchCriteriaId": "6B4A8C48-5DF9-4861-B767-6AABE67736D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11410:*:*:*:*:*:*", "matchCriteriaId": "720A4E3B-2C76-486B-820D-648AAA885C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11411:*:*:*:*:*:*", "matchCriteriaId": "8E1F42EC-1A2D-46B4-80D5-1DDC9E4F45DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11412:*:*:*:*:*:*", "matchCriteriaId": "ABFAC52E-C01A-45D6-99E2-316A6F4DC8A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11413:*:*:*:*:*:*", "matchCriteriaId": "2F913C17-41BA-44BA-9EF7-740170C8B62F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11414:*:*:*:*:*:*", "matchCriteriaId": "8B1CFCCF-014E-4B03-A940-2DBE62A234F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11415:*:*:*:*:*:*", "matchCriteriaId": "E0883269-360A-467F-93D6-5E640732481B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11416:*:*:*:*:*:*", "matchCriteriaId": "92B71BFB-35C9-42FC-B543-2A0B2593E4C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11417:*:*:*:*:*:*", "matchCriteriaId": "DF1E61A4-CDC2-47BC-9482-FA91D8ECFC85", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11418:*:*:*:*:*:*", "matchCriteriaId": "9F8351AB-510A-4BBE-8FBF-9180BFFE24BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11419:*:*:*:*:*:*", "matchCriteriaId": "FBC3EA58-D4C0-41BE-BED0-AF1F55B923CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11420:*:*:*:*:*:*", "matchCriteriaId": "E50498FA-4630-49FA-AF4F-1F2C152A9D36", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11421:*:*:*:*:*:*", "matchCriteriaId": "7461E19D-E14E-4C44-A5CF-3BB81E943EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11423:*:*:*:*:*:*", "matchCriteriaId": "96C85EA3-AF85-41FF-AE0C-CCC8BB7724EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11424:*:*:*:*:*:*", "matchCriteriaId": "70C08996-9B16-40EC-BADF-3AE240973C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11425:*:*:*:*:*:*", "matchCriteriaId": "D6F9CFBC-6AC1-4196-A091-45755CBB5B05", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11426:*:*:*:*:*:*", "matchCriteriaId": "C85B161D-C4C1-4D73-95F7-64E058D3C951", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11427:*:*:*:*:*:*", "matchCriteriaId": "63539C86-C49B-4BE3-822D-E6416AD4EFD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11428:*:*:*:*:*:*", "matchCriteriaId": "9B29AC61-833A-4533-AA3B-92753F70C287", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11429:*:*:*:*:*:*", "matchCriteriaId": "54A9C4A5-6295-415F-9613-8CA55691C903", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11430:*:*:*:*:*:*", "matchCriteriaId": "93D48D34-A0F7-410B-BCBD-84B1A29BE7A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11431:*:*:*:*:*:*", "matchCriteriaId": "F230DAB1-CD84-4464-A2AC-9507C89F2245", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11432:*:*:*:*:*:*", "matchCriteriaId": "8832003A-2FBF-44B8-9393-35D0A75C2673", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11433:*:*:*:*:*:*", "matchCriteriaId": "F5E94F24-3CC3-4796-A464-858542F1690F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11434:*:*:*:*:*:*", "matchCriteriaId": "FF174E30-F8AD-4028-885E-050BA568BE2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11435:*:*:*:*:*:*", "matchCriteriaId": "D855FBDC-0C9F-46A6-87B2-E0ADB7FD9C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11436:*:*:*:*:*:*", "matchCriteriaId": "4747E1A8-E80A-4DC7-84EF-096AC7DDC492", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11437:*:*:*:*:*:*", "matchCriteriaId": "0E2143D7-616B-4F89-8EB3-4AAFE72B48C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11438:*:*:*:*:*:*", "matchCriteriaId": "518B56E7-A3EB-4ED4-8631-224913AA69DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11439:*:*:*:*:*:*", "matchCriteriaId": "E4959E8B-EF54-48D7-A7CC-1401E0186BDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11440:*:*:*:*:*:*", "matchCriteriaId": "06B3B720-BEB5-46F5-945E-361BC04B9179", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11441:*:*:*:*:*:*", "matchCriteriaId": "FE748BC2-6B4D-4626-A74A-B2C6855B4E99", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11442:*:*:*:*:*:*", "matchCriteriaId": "954AB47A-2216-4504-82A4-9259D02FC2C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11443:*:*:*:*:*:*", "matchCriteriaId": "BC29B7FC-8D04-43B4-94A9-7ABA99D2D24C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11444:*:*:*:*:*:*", "matchCriteriaId": "BC31C352-93B1-43DB-8898-742054C49021", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11445:*:*:*:*:*:*", "matchCriteriaId": "C7CE4AE1-D74E-4F66-9132-DF7201CE3CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11446:*:*:*:*:*:*", "matchCriteriaId": "2FDCD1EC-1936-4155-9865-97CEE896F118", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11447:*:*:*:*:*:*", "matchCriteriaId": "58531E46-3366-4C25-87E4-C335A29D016D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11448:*:*:*:*:*:*", "matchCriteriaId": "5863118B-BF22-413D-B934-BA778811BC5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11449:*:*:*:*:*:*", "matchCriteriaId": "D086B2C4-5E81-4BB7-A7B8-800B17B2625A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11450:*:*:*:*:*:*", "matchCriteriaId": "8BDD8CDD-F272-44BC-8C14-EE5F7862F909", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11451:*:*:*:*:*:*", "matchCriteriaId": "05934695-D0BB-4E5C-9A45-36921DE631E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11452:*:*:*:*:*:*", "matchCriteriaId": "11982E6A-ADF5-43AA-B33A-4C2EAA201901", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11453:*:*:*:*:*:*", "matchCriteriaId": "C473ABAD-C046-46DF-99D1-AEADC12BF3A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11454:*:*:*:*:*:*", "matchCriteriaId": "3A14939E-2450-4ED5-9A0E-13E7EAB949BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11455:*:*:*:*:*:*", "matchCriteriaId": "5CBA1F5B-9766-41D7-8117-26EFB34FE599", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11456:*:*:*:*:*:*", "matchCriteriaId": "F5D53ABB-5F99-4428-8F1B-B3C6070CA3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11457:*:*:*:*:*:*", "matchCriteriaId": "5A0EAF0B-0232-4FBF-ADC3-C8C922FC82B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11458:*:*:*:*:*:*", "matchCriteriaId": "FA2E6FCA-846E-44AB-9804-FB4EE0463A4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11459:*:*:*:*:*:*", "matchCriteriaId": "E7FF8218-4BAA-4B7C-B6D6-4522BD423ECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11460:*:*:*:*:*:*", "matchCriteriaId": "F7CD7EFD-6669-4EB6-952E-8197B82DB99B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11461:*:*:*:*:*:*", "matchCriteriaId": "8239F59B-38CA-465D-B022-654751025A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11462:*:*:*:*:*:*", "matchCriteriaId": "E28DFD98-5CA2-4831-9400-F70ED7116999", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11463:*:*:*:*:*:*", "matchCriteriaId": "0E7E6D5D-9C5C-492D-8560-73944CA0B82F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11464:*:*:*:*:*:*", "matchCriteriaId": "18253FC6-B145-4673-93F1-1C11BE59D8CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11465:*:*:*:*:*:*", "matchCriteriaId": "D43B7226-04EC-4D65-921D-681F692E0D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11466:*:*:*:*:*:*", "matchCriteriaId": "E9AF8942-E9CB-43BC-9DD5-3EB19F437A2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11467:*:*:*:*:*:*", "matchCriteriaId": "3C4B1055-0D90-482D-A75C-F04A9CD85EBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11468:*:*:*:*:*:*", "matchCriteriaId": "BC733A15-0034-46FA-97F4-418E658A416A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11471:*:*:*:*:*:*", "matchCriteriaId": "04D5F83E-D015-4D54-8BC6-D9A8F99A584D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11472:*:*:*:*:*:*", "matchCriteriaId": "833CC039-373A-476B-B41B-26276AD1F28D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11473:*:*:*:*:*:*", "matchCriteriaId": "180D2843-5F1B-4C43-A3DE-27D7F79AE8DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11474:*:*:*:*:*:*", "matchCriteriaId": "5DA65A09-DE4E-4BD7-8586-3F5FFEAD1C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11475:*:*:*:*:*:*", "matchCriteriaId": "8D1146AB-9909-4989-8F55-0C38661CC19E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11476:*:*:*:*:*:*", "matchCriteriaId": "2E9C6D63-F7E6-41E5-B12A-6AE5B12D7E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11477:*:*:*:*:*:*", "matchCriteriaId": "CBCBE145-74E2-4B1A-AD8B-17B395D6EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11478:*:*:*:*:*:*", "matchCriteriaId": "D76D1F4C-A6D9-4682-9551-079C14A39449", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11479:*:*:*:*:*:*", "matchCriteriaId": "46C2CFD1-2633-46EB-A300-451580BC30D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11480:*:*:*:*:*:*", "matchCriteriaId": "7BCE00BA-98BD-4D7A-A298-77AA6B0F2AB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11481:*:*:*:*:*:*", "matchCriteriaId": "511A1427-DEAA-45F9-B51B-7D5CF26825E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11482:*:*:*:*:*:*", "matchCriteriaId": "C0482A91-7DCC-466B-8D62-3BAD387F6AEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11483:*:*:*:*:*:*", "matchCriteriaId": "2B1454B2-A31E-4F41-93F2-BA9193A2070D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11484:*:*:*:*:*:*", "matchCriteriaId": "08058B53-A76F-4E8C-80DB-40DE7847C6C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11485:*:*:*:*:*:*", "matchCriteriaId": "C8FDCA38-3173-47D0-8041-72C683BCEADB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11486:*:*:*:*:*:*", "matchCriteriaId": "F2C82049-4490-49DC-9C10-01314309A1DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11487:*:*:*:*:*:*", "matchCriteriaId": "5F2D3A2E-1D67-497B-855A-42DB15DAA90E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11488:*:*:*:*:*:*", "matchCriteriaId": "629D3626-FF4F-4DCB-8FF3-CE2B6A9E2795", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11489:*:*:*:*:*:*", "matchCriteriaId": "9D5764B2-B287-463D-8993-70DF258658F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11490:*:*:*:*:*:*", "matchCriteriaId": "1E3090B4-55DD-4BDF-AAB3-5595B0FA6F63", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11491:*:*:*:*:*:*", "matchCriteriaId": "75767E43-3AE3-43F1-A9F9-7D0047B77115", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11492:*:*:*:*:*:*", "matchCriteriaId": "CA9F005E-7C3B-40CA-A99C-1C64716A9ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11493:*:*:*:*:*:*", "matchCriteriaId": "7FFA6A16-3296-4F75-AC4D-8B214CA9F0AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11494:*:*:*:*:*:*", "matchCriteriaId": "C16B9DFB-946F-4712-9060-144A9F52FCCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11495:*:*:*:*:*:*", "matchCriteriaId": "13570897-8539-49AF-B881-D071BC06B326", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11496:*:*:*:*:*:*", "matchCriteriaId": "642AA726-3229-4AA4-A0AD-461FF5DEF645", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11497:*:*:*:*:*:*", "matchCriteriaId": "BA8A79FC-06BF-4E0F-A049-935FE63A4A96", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11498:*:*:*:*:*:*", "matchCriteriaId": "E10D87ED-13D2-493A-BDF8-72DEA88F0322", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11499:*:*:*:*:*:*", "matchCriteriaId": "1B558A36-0967-43A1-8900-C3A05C61DB79", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11500:*:*:*:*:*:*", "matchCriteriaId": "7ABC86C5-C36C-4FCD-988B-A4927B7091C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11501:*:*:*:*:*:*", "matchCriteriaId": "65609E88-1184-4217-9998-D0B5C87F3513", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11502:*:*:*:*:*:*", "matchCriteriaId": "40F9B1D0-FF0B-419A-BAEE-616A5368C0A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11503:*:*:*:*:*:*", "matchCriteriaId": "935D0AB5-5339-46BE-9B36-E6E9F5DF4D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11504:*:*:*:*:*:*", "matchCriteriaId": "7693CB26-E685-479A-B808-9027334003D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11505:*:*:*:*:*:*", "matchCriteriaId": "784999AA-30BE-4749-9E50-E5C99C1A0700", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11506:*:*:*:*:*:*", "matchCriteriaId": "F14487A2-FF47-41C9-A6B6-16B93580EDCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11507:*:*:*:*:*:*", "matchCriteriaId": "9CC64D62-92AA-4CB6-9913-3AA79A0B81BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11508:*:*:*:*:*:*", "matchCriteriaId": "8B8A3BC7-9820-421B-AB55-EEB8421EEEA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11509:*:*:*:*:*:*", "matchCriteriaId": "339E6065-37C5-40F1-8054-04CCF4950D98", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11510:*:*:*:*:*:*", "matchCriteriaId": "575E70B6-16E3-4DCB-B803-7BE359BA7377", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11511:*:*:*:*:*:*", "matchCriteriaId": "85D877EB-31A3-4B5D-BE14-96539DD6F55F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11512:*:*:*:*:*:*", "matchCriteriaId": "2131DBCA-99E7-4F98-8B73-AE9420D1FD6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11513:*:*:*:*:*:*", "matchCriteriaId": "847450BA-FFBB-4BFD-B30C-A94C109EFC61", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11514:*:*:*:*:*:*", "matchCriteriaId": "1FD91478-6776-4787-B241-48FCDA3323BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11515:*:*:*:*:*:*", "matchCriteriaId": "46D31BF7-EFC6-4E6C-9F37-7771205C85A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11516:*:*:*:*:*:*", "matchCriteriaId": "94EC4A38-FC03-49C1-9448-073CFB87A028", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11517:*:*:*:*:*:*", "matchCriteriaId": "EE5CF6B9-29DF-452B-A388-48A84949CB88", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11518:*:*:*:*:*:*", "matchCriteriaId": "8AEADDE6-67AF-448E-AC31-106D651401BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11519:*:*:*:*:*:*", "matchCriteriaId": "1D569D65-A3A4-4E68-BF8D-08DCFA128CFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11520:*:*:*:*:*:*", "matchCriteriaId": "BAE79FFA-9932-406C-9E22-3AF81DF224F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11521:*:*:*:*:*:*", "matchCriteriaId": "CCDBC4AE-2931-492D-B4A7-37EADB94E912", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11522:*:*:*:*:*:*", "matchCriteriaId": "9D5BEC6A-900D-4F60-9950-A0F6CECC668D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11523:*:*:*:*:*:*", "matchCriteriaId": "B94E1D0C-31C4-49D3-BC9B-3CB14174F718", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11524:*:*:*:*:*:*", "matchCriteriaId": "787BCD37-5EF4-4A36-B606-A0BF9C4A7636", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11525:*:*:*:*:*:*", "matchCriteriaId": "8DA7790B-F835-4F06-AE66-13FA093A7039", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11526:*:*:*:*:*:*", "matchCriteriaId": "862833C5-1112-489B-B8C3-C6C723099733", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11527:*:*:*:*:*:*", "matchCriteriaId": "0FD2CBF1-20DB-40D8-90AE-1B1FAE3E8848", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11528:*:*:*:*:*:*", "matchCriteriaId": "1F3C6301-28B3-496F-BB59-A96B39F8F93B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11529:*:*:*:*:*:*", "matchCriteriaId": "9271FAA1-6591-4824-88AF-017A8D74069A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11530:*:*:*:*:*:*", "matchCriteriaId": "C1195B5A-6884-4A93-8E2C-F7FDCFA765C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11531:*:*:*:*:*:*", "matchCriteriaId": "E023CBFD-DBF2-49C7-9972-60D94FE15456", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11532:*:*:*:*:*:*", "matchCriteriaId": "CA5A2BC3-CEF3-44C8-9F8B-7581E273CA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11533:*:*:*:*:*:*", "matchCriteriaId": "EEBC94A0-AB6D-4797-826E-341925C913E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11534:*:*:*:*:*:*", "matchCriteriaId": "B3DF48B2-9C99-4FE3-B8EF-892B24BCD0EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11535:*:*:*:*:*:*", "matchCriteriaId": "99FB1340-19F1-4A67-AAC8-86B5F846ABF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11536:*:*:*:*:*:*", "matchCriteriaId": "E21D8BC5-7B8E-4849-9890-C70F8861154D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11537:*:*:*:*:*:*", "matchCriteriaId": "AC96247A-4B20-4BDD-89C8-4FCD9CA226EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11538:*:*:*:*:*:*", "matchCriteriaId": "FEBE27C5-4561-4471-A937-190E57511ED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11539:*:*:*:*:*:*", "matchCriteriaId": "6DAD103B-6EFB-4D7F-A8E3-583024D2DA6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11540:*:*:*:*:*:*", "matchCriteriaId": "4BB11A5A-A48D-49DF-AD62-84BAE316B0DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11541:*:*:*:*:*:*", "matchCriteriaId": "C5719568-5AE3-44AB-BCF9-905114533455", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11542:*:*:*:*:*:*", "matchCriteriaId": "620FE8E3-2ED6-442D-9F9A-F9688361CE78", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11543:*:*:*:*:*:*", "matchCriteriaId": "EF34BA4B-DFC8-4DF9-8BBD-49D0CCBA07A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11544:*:*:*:*:*:*", "matchCriteriaId": "603E7E72-B2C3-46B5-8EF5-5819FB42E359", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11545:*:*:*:*:*:*", "matchCriteriaId": "64EE62B3-2B8E-4F13-8872-15F591444AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11546:*:*:*:*:*:*", "matchCriteriaId": "90BD81EF-9CC5-4755-862E-E5883215326E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11547:*:*:*:*:*:*", "matchCriteriaId": "6DB97E9D-3E7A-464E-8A8E-166A330D6C35", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11548:*:*:*:*:*:*", "matchCriteriaId": "872EDDB1-C793-4212-8D0E-19EA2706CAD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11549:*:*:*:*:*:*", "matchCriteriaId": "BD39EED0-CD40-480F-A2AB-18768539B635", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11550:*:*:*:*:*:*", "matchCriteriaId": "EC010F57-A248-449A-8D95-EC70AAB7FF07", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11551:*:*:*:*:*:*", "matchCriteriaId": "9F5F748D-53DC-4B78-A0E3-2F2D30B37E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11552:*:*:*:*:*:*", "matchCriteriaId": "98ACD4F3-1133-43B7-B000-7DB1DD534A69", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11553:*:*:*:*:*:*", "matchCriteriaId": "8E34C639-284A-4E73-86A4-C9588D188B1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11554:*:*:*:*:*:*", "matchCriteriaId": "C368F8D3-5078-4A13-9502-77403B833577", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11555:*:*:*:*:*:*", "matchCriteriaId": "48C7409F-FA36-44A8-8F58-E0F8C8D1780D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11556:*:*:*:*:*:*", "matchCriteriaId": "606281E9-0A0C-4679-8691-C4D379C8667E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11557:*:*:*:*:*:*", "matchCriteriaId": "1D43E6D9-7754-4C23-A180-739220E099E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11558:*:*:*:*:*:*", "matchCriteriaId": "76E208D2-1B65-463E-BC95-32C0B272FE9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11559:*:*:*:*:*:*", "matchCriteriaId": "C368F136-DC3A-45DA-9F31-AAABE81F1E73", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11560:*:*:*:*:*:*", "matchCriteriaId": "40E7AF64-A97B-4A09-A030-9AC95A0CE08E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11561:*:*:*:*:*:*", "matchCriteriaId": "19207A4A-1BD9-43A1-9E81-05762FC11E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11562:*:*:*:*:*:*", "matchCriteriaId": "256E8075-C6E4-409E-B8CE-927AB96F5842", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11563:*:*:*:*:*:*", "matchCriteriaId": "79476EAC-30C1-4278-AC1F-29FC2DA49C09", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11564:*:*:*:*:*:*", "matchCriteriaId": "0507679B-C833-4B51-B3D9-2DD54C535CC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11565:*:*:*:*:*:*", "matchCriteriaId": "843F13EC-1B03-4B45-9DAA-CD871FF5959A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11566:*:*:*:*:*:*", "matchCriteriaId": "74B7D897-ADD6-4FAB-B51F-3D11F9361DAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11567:*:*:*:*:*:*", "matchCriteriaId": "0DDC8BAF-C9BF-487A-A4E0-6F2C646D4BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11568:*:*:*:*:*:*", "matchCriteriaId": "887DA8A3-D9FF-4F6B-9948-D239E1AC78E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11569:*:*:*:*:*:*", "matchCriteriaId": "B71361D7-97EF-475A-9D06-5A210D327EC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11570:*:*:*:*:*:*", "matchCriteriaId": "2F917368-D3EA-4889-B06A-EE4B48E301DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11571:*:*:*:*:*:*", "matchCriteriaId": "BC583CF9-84DE-4E9D-A9B3-F5CDEF9CB0C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11572:*:*:*:*:*:*", "matchCriteriaId": "E75AC16B-90E4-4C92-88FC-B3428271CBD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11573:*:*:*:*:*:*", "matchCriteriaId": "EA2B9B7B-8832-4CCA-8829-8CA6880FE255", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11574:*:*:*:*:*:*", "matchCriteriaId": "04BE42E8-B146-428B-8C25-68693D3D7ECF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11575:*:*:*:*:*:*", "matchCriteriaId": "AB99E931-F013-4C43-9913-E14F582E7814", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11576:*:*:*:*:*:*", "matchCriteriaId": "3BDCA1C0-DE9F-40EA-B543-797BC9E857F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11577:*:*:*:*:*:*", "matchCriteriaId": "E0DD1BC2-252E-4562-A664-2FC4D0EB9BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11578:*:*:*:*:*:*", "matchCriteriaId": "207510B1-6480-4630-A9E6-4D11B40C0818", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11579:*:*:*:*:*:*", "matchCriteriaId": "827A2D8A-D056-4402-80AB-89FAC0F42DAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11580:*:*:*:*:*:*", "matchCriteriaId": "F40C156F-B9F0-4DD5-B7C2-6A22970EA134", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11581:*:*:*:*:*:*", "matchCriteriaId": "06868E31-116F-44E5-985D-9A3A7385178F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11582:*:*:*:*:*:*", "matchCriteriaId": "509238BA-4513-437F-B48A-8089AD23B31C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11583:*:*:*:*:*:*", "matchCriteriaId": "A964DB4E-AD57-4F67-B403-8BB84071FD82", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11584:*:*:*:*:*:*", "matchCriteriaId": "0ADD172F-4593-4B90-9D2D-AFEFE60F8A88", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11585:*:*:*:*:*:*", "matchCriteriaId": "BDDD5CBD-C251-4B51-9A59-51161824E54C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11586:*:*:*:*:*:*", "matchCriteriaId": "D276C2DC-F161-4C4D-B88F-6C9F98E51AC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11587:*:*:*:*:*:*", "matchCriteriaId": "1D925049-10D2-4473-93A8-BA17EBC5A272", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11588:*:*:*:*:*:*", "matchCriteriaId": "9F9F471B-13D4-4B80-BE47-835EA7A26389", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11589:*:*:*:*:*:*", "matchCriteriaId": "E3F42381-0E0D-4298-B7CD-8066CDFA077A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11590:*:*:*:*:*:*", "matchCriteriaId": "76CB30F6-35CA-4077-98B9-75AD3FF3AC88", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11591:*:*:*:*:*:*", "matchCriteriaId": "93E3D29F-8277-4E6D-B656-E229D8C3523D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11592:*:*:*:*:*:*", "matchCriteriaId": "3E7A950E-C80C-4E19-8A8D-B1E5FDD007FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11593:*:*:*:*:*:*", "matchCriteriaId": "70332333-806F-4F7F-9F85-1FFC6604CC67", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11594:*:*:*:*:*:*", "matchCriteriaId": "697A4DD0-4BFB-4564-88BA-D7C829010368", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11595:*:*:*:*:*:*", "matchCriteriaId": "B851D57A-230E-4362-A689-1AF03B239AC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11596:*:*:*:*:*:*", "matchCriteriaId": "C72D8177-1F9F-46C3-83E0-186447CD92EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11597:*:*:*:*:*:*", "matchCriteriaId": "8E8C80E8-5C90-4F19-97E8-20CA993D0322", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11598:*:*:*:*:*:*", "matchCriteriaId": "041D2C7A-A393-480A-9CB2-935411225AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11599:*:*:*:*:*:*", "matchCriteriaId": "988F845D-CE11-42EE-942F-FEE239088C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11600:*:*:*:*:*:*", "matchCriteriaId": "E14D8076-617F-4A48-9AD2-3E32D48BED9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11601:*:*:*:*:*:*", "matchCriteriaId": "528A11B9-3561-4FCB-B949-7F9C51A6DC87", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11602:*:*:*:*:*:*", "matchCriteriaId": "F81C0F17-D659-48C7-8E51-6E2C122E8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11603:*:*:*:*:*:*", "matchCriteriaId": "3C1AD98E-B263-4803-9C34-31156EFBE853", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11604:*:*:*:*:*:*", "matchCriteriaId": "98DCC22C-0F4C-4BCD-9825-1018CF18ABFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11605:*:*:*:*:*:*", "matchCriteriaId": "E03F8F12-E2A3-4408-BDF7-A45E757223E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11606:*:*:*:*:*:*", "matchCriteriaId": "A45C0E5B-B951-4E91-80EA-54970D46B55A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11607:*:*:*:*:*:*", "matchCriteriaId": "D0BAE2B7-8877-41F9-8630-FED0EEECC088", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11608:*:*:*:*:*:*", "matchCriteriaId": "56E0175D-6BFD-49E3-AE86-D4E5985CC685", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11609:*:*:*:*:*:*", "matchCriteriaId": "3009037B-F036-49FC-BA65-171094A36195", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11610:*:*:*:*:*:*", "matchCriteriaId": "726CB6C1-501A-40B4-AE28-85AB784DEC4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11611:*:*:*:*:*:*", "matchCriteriaId": "B1957EDA-E9B9-445F-BBF7-2F4CBF7193C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11612:*:*:*:*:*:*", "matchCriteriaId": "EA47A517-3425-4B1D-88A9-1052B3C38645", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11613:*:*:*:*:*:*", "matchCriteriaId": "61831A8F-7554-4609-94B0-A4D16C5E4151", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11614:*:*:*:*:*:*", "matchCriteriaId": "4482095A-E881-4DDA-9C0A-274D017670DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11615:*:*:*:*:*:*", "matchCriteriaId": "DB952680-F9A5-441F-95E2-BFA6DBAF463F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11616:*:*:*:*:*:*", "matchCriteriaId": "8DAF4066-2423-4708-9A52-DE1E0DC598C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11617:*:*:*:*:*:*", "matchCriteriaId": "FE547DC1-7FCE-4C76-9F81-92D7B350B309", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11618:*:*:*:*:*:*", "matchCriteriaId": "EF97ACFD-CE5B-4F69-8915-39BE0294C1E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11619:*:*:*:*:*:*", "matchCriteriaId": "851BA535-ACF1-453B-956E-1D59BBF4BF24", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11620:*:*:*:*:*:*", "matchCriteriaId": "5E0E6FA8-54A7-4632-BE76-889A22B34A5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11621:*:*:*:*:*:*", "matchCriteriaId": "15A8DDEC-6802-4664-8A90-4BDDF21E0307", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11622:*:*:*:*:*:*", "matchCriteriaId": "A3BBA407-8B74-4F34-A1D8-340F22A3AF85", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11623:*:*:*:*:*:*", "matchCriteriaId": "C7C03D0B-22DE-4E17-8ACA-20032BD4ECAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11624:*:*:*:*:*:*", "matchCriteriaId": "D072AE79-0DF2-4EB0-944F-86652AF4080F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11625:*:*:*:*:*:*", "matchCriteriaId": "5D7A7D6D-C239-4DB5-ABF7-1044AC3CE146", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11626:*:*:*:*:*:*", "matchCriteriaId": "7DAC3EB5-5FF4-4211-8C44-55AD58223E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11627:*:*:*:*:*:*", "matchCriteriaId": "07D8AE80-F1E0-462F-AA59-13A73EA8374D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11628:*:*:*:*:*:*", "matchCriteriaId": "369B28EE-434A-41F0-88AA-7FC7CFA55C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11629:*:*:*:*:*:*", "matchCriteriaId": "AC873975-0398-46F7-B980-B6DF6DC1A763", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11630:*:*:*:*:*:*", "matchCriteriaId": "C3793A31-71C2-4176-A878-0CC93D3335EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11631:*:*:*:*:*:*", "matchCriteriaId": "7CAD76BB-298B-4135-BE62-96BEC3ED3A50", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11632:*:*:*:*:*:*", "matchCriteriaId": "D5545BA9-3135-4084-A0BD-22A8CB4E5871", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11633:*:*:*:*:*:*", "matchCriteriaId": "3BE94195-4FD1-4EE6-809A-EF61B6C5E101", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11634:*:*:*:*:*:*", "matchCriteriaId": "AD344183-65DD-42DA-9BC9-754323F8FAEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11635:*:*:*:*:*:*", "matchCriteriaId": "2C102FD9-0CEC-4363-8325-D2F922B782E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11636:*:*:*:*:*:*", "matchCriteriaId": "7476C7FA-71B2-4024-981B-1D8B2064564E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11637:*:*:*:*:*:*", "matchCriteriaId": "BDE2CCFD-A11C-4517-8B3A-40F5D9931972", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11638:*:*:*:*:*:*", "matchCriteriaId": "23E85EC9-A707-4A23-B6CE-4B0FF002676E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11639:*:*:*:*:*:*", "matchCriteriaId": "DED518A7-1DED-4CF2-9DFE-497202EC8EEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11640:*:*:*:*:*:*", "matchCriteriaId": "18FE975F-61E0-49E7-BD9A-A9BC9498DAA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11641:*:*:*:*:*:*", "matchCriteriaId": "65033F0D-6C6F-46FA-BD7E-049BA2527B8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11642:*:*:*:*:*:*", "matchCriteriaId": "D4A52837-1635-4DB3-AC03-395E0813E1E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11643:*:*:*:*:*:*", "matchCriteriaId": "3AAA8845-9E56-474C-B45C-9BB143A6DE82", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11644:*:*:*:*:*:*", "matchCriteriaId": "2D729670-4E53-4D39-943B-3EA7BDD3406B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11645:*:*:*:*:*:*", "matchCriteriaId": "0621F90F-434D-4360-B577-AD7B314F21E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11646:*:*:*:*:*:*", "matchCriteriaId": "41D9C0B5-349B-4F9A-996D-80D19BC54A93", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11647:*:*:*:*:*:*", "matchCriteriaId": "5F14699C-52A2-4249-9047-AAD684F7FDC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11648:*:*:*:*:*:*", "matchCriteriaId": "9CCC338B-2ACD-494E-B4BC-EABF61855ED0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11649:*:*:*:*:*:*", "matchCriteriaId": "3FAF806B-DFC2-46AE-95A8-A9D751394A53", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11650:*:*:*:*:*:*", "matchCriteriaId": "9685FB0C-5E36-4CFC-810A-7733040E4EEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11651:*:*:*:*:*:*", "matchCriteriaId": "1AE766FA-32F7-4A19-B55B-4086963B8451", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11652:*:*:*:*:*:*", "matchCriteriaId": "3F4B1D2D-32EB-4376-8F48-C87F9A0A3888", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11653:*:*:*:*:*:*", "matchCriteriaId": "5522BD02-0FB1-426C-9A0C-A3B6428B1D69", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11654:*:*:*:*:*:*", "matchCriteriaId": "81133243-0704-4EA5-914C-8FB85607388E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11655:*:*:*:*:*:*", "matchCriteriaId": "073B3616-E74E-4A7F-B838-37BDD8ED8A1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11656:*:*:*:*:*:*", "matchCriteriaId": "0A0A709A-1515-4CF4-86FF-67791B331843", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11657:*:*:*:*:*:*", "matchCriteriaId": "02F4FB4C-9A49-4D74-8712-D482CC017241", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11658:*:*:*:*:*:*", "matchCriteriaId": "CB005CA9-ED40-442B-ABD9-E63B1BF73645", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11659:*:*:*:*:*:*", "matchCriteriaId": "7CD1DAF3-A1D4-4CC8-8005-894E2222770E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11660:*:*:*:*:*:*", "matchCriteriaId": "A0C4B4FB-BFD3-42F2-83E3-96B38C777F7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11661:*:*:*:*:*:*", "matchCriteriaId": "CE4AE1E6-45D2-40E9-B215-8AC9ABA7C343", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11662:*:*:*:*:*:*", "matchCriteriaId": "B844AF93-4F3F-42E9-9877-66080937CFC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11663:*:*:*:*:*:*", "matchCriteriaId": "8D21763C-EBEF-4C46-9C4C-458D5AD9D057", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11664:*:*:*:*:*:*", "matchCriteriaId": "A448EED3-B071-41FF-9C08-F33C53C9061D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11665:*:*:*:*:*:*", "matchCriteriaId": "70E0BA05-2F5F-4A38-9E40-277C1D9EAD87", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11666:*:*:*:*:*:*", "matchCriteriaId": "B963D1F3-A660-48B0-809C-478B6EC30568", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11667:*:*:*:*:*:*", "matchCriteriaId": "6A00F0E9-80CD-4C1D-9164-75BF47516997", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11668:*:*:*:*:*:*", "matchCriteriaId": "DFC5C07F-B1C7-4E28-83A4-8DC4910C4B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11669:*:*:*:*:*:*", "matchCriteriaId": "09E830A2-7571-4FD3-86FD-38F1FA2AEBD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11670:*:*:*:*:*:*", "matchCriteriaId": "6EEF78E9-85D2-4120-8B9E-79DA127B0BFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11671:*:*:*:*:*:*", "matchCriteriaId": "D774B982-7D45-403E-89D3-0E38319DD217", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11672:*:*:*:*:*:*", "matchCriteriaId": "B870CD41-AFAF-4DA7-9C69-AC806721CD3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11673:*:*:*:*:*:*", "matchCriteriaId": "E91C64D1-0BF5-4588-AE97-BFFB5B645CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11674:*:*:*:*:*:*", "matchCriteriaId": "4E274AF8-4C9A-4548-81E3-01B52303CFC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11675:*:*:*:*:*:*", "matchCriteriaId": "5BB19896-EEA9-4563-81EE-A4AF3FF2B67C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11676:*:*:*:*:*:*", "matchCriteriaId": "26C123A5-0F02-4360-ADCE-94B18069C7C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11677:*:*:*:*:*:*", "matchCriteriaId": "481BDAA9-6351-4B0A-B3D0-36BEF01B84E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11678:*:*:*:*:*:*", "matchCriteriaId": "51FC36A2-164C-43E8-8063-2D4843551497", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11679:*:*:*:*:*:*", "matchCriteriaId": "13671866-8BBF-41E6-917A-D63C379EE65A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11680:*:*:*:*:*:*", "matchCriteriaId": "F771C4A5-D219-44CF-86C1-0B83EC09F972", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11681:*:*:*:*:*:*", "matchCriteriaId": "D3DA5CD2-010C-4C84-A5D2-8FC357450700", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11682:*:*:*:*:*:*", "matchCriteriaId": "C1B43F39-8680-46D8-BB27-A54DDDCCA1CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11683:*:*:*:*:*:*", "matchCriteriaId": "7E2D4F56-BA69-4EDD-AE21-29554CBAD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11684:*:*:*:*:*:*", "matchCriteriaId": "CFDE0FFD-5828-4B24-965F-9BAD55052656", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11685:*:*:*:*:*:*", "matchCriteriaId": "FE5BC864-14A9-4CF2-BB32-14ED50BA17E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11686:*:*:*:*:*:*", "matchCriteriaId": "FB8194CC-5D19-414C-9356-332907788D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11687:*:*:*:*:*:*", "matchCriteriaId": "5C106062-9FE8-42EA-9EF8-3B610FF0A9D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11688:*:*:*:*:*:*", "matchCriteriaId": "76E29B92-A8CB-4102-B916-CF92CF002642", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11689:*:*:*:*:*:*", "matchCriteriaId": "107D9625-07C6-423E-869E-D90E2DF195B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11690:*:*:*:*:*:*", "matchCriteriaId": "5C2F1A7D-2B49-4400-BE23-C321BDCDE82E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11691:*:*:*:*:*:*", "matchCriteriaId": "B03FB4F3-EB98-4E83-AC86-E0259351446A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11692:*:*:*:*:*:*", "matchCriteriaId": "AA569417-2768-41B6-9BD1-CDC7E84D903E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11693:*:*:*:*:*:*", "matchCriteriaId": "E923F15B-7D7C-4184-A025-0AB12C357560", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11694:*:*:*:*:*:*", "matchCriteriaId": "5E14CBB4-5719-4B11-B816-69B2DC0728B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11695:*:*:*:*:*:*", "matchCriteriaId": "DF3F9CB9-BC2D-4AF1-97DC-E5A33273D531", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11696:*:*:*:*:*:*", "matchCriteriaId": "9EBD9D2D-0B33-4D12-91CD-12509F098EB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11697:*:*:*:*:*:*", "matchCriteriaId": "5DB7F2E1-40B1-468B-ABD0-7F4D288438DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11698:*:*:*:*:*:*", "matchCriteriaId": "97BDB3BD-B646-4074-8D8C-E0F44FEAACEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11699:*:*:*:*:*:*", "matchCriteriaId": "BE3A4AE3-F05A-4E27-A7D0-6DF3A6BF1B19", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11700:*:*:*:*:*:*", "matchCriteriaId": "17A72239-FAF9-4FF6-A0A9-E8DCC36795FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11701:*:*:*:*:*:*", "matchCriteriaId": "2684B42A-5878-4923-AA69-5E925A1246FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11702:*:*:*:*:*:*", "matchCriteriaId": "B211785E-F17E-4755-9EF3-3BE15F7B20D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11703:*:*:*:*:*:*", "matchCriteriaId": "49C752A1-2C5B-418F-B637-B538F0496562", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11704:*:*:*:*:*:*", "matchCriteriaId": "EA1F28A5-8023-4855-9F20-6F37DC686F08", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11705:*:*:*:*:*:*", "matchCriteriaId": "9AF1B336-2B0F-4612-BBED-44CF53247FA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11706:*:*:*:*:*:*", "matchCriteriaId": "D589845E-4C79-44C7-8274-C4D7434819D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11707:*:*:*:*:*:*", "matchCriteriaId": "E4FDED09-AE44-40A3-8C6C-05B027A14C62", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11708:*:*:*:*:*:*", "matchCriteriaId": "9B6CFB9B-8E57-45EF-92FF-95E2A75EED5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11709:*:*:*:*:*:*", "matchCriteriaId": "41FE453A-E4B8-4B02-ADA1-3A263AAD6C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11710:*:*:*:*:*:*", "matchCriteriaId": "DF8D1BF3-3CBF-4054-AAC0-4679012373EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11711:*:*:*:*:*:*", "matchCriteriaId": "56A8AC22-DD52-4B26-AE66-2F196C2FD6CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11712:*:*:*:*:*:*", "matchCriteriaId": "54109935-A9C8-4C81-B1A7-207A9E1405ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11713:*:*:*:*:*:*", "matchCriteriaId": "DF250C5F-DCBA-4A5E-81D9-82284FA8730E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11714:*:*:*:*:*:*", "matchCriteriaId": "6C573579-FDC1-473E-939B-5107CEBC6678", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11715:*:*:*:*:*:*", "matchCriteriaId": "7A8465ED-2032-4DF0-B724-DAEDC5CF3FA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11716:*:*:*:*:*:*", "matchCriteriaId": "FEA62274-7664-466F-8D87-3E6B85701ADE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11717:*:*:*:*:*:*", "matchCriteriaId": "06F90C0F-3220-40B1-A5A1-A9E51D4B7830", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11718:*:*:*:*:*:*", "matchCriteriaId": "517A32AF-243D-4725-B9CC-4C9AD08EC3B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11719:*:*:*:*:*:*", "matchCriteriaId": "3F136D1D-9816-493B-A537-2ED12A6C4491", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11720:*:*:*:*:*:*", "matchCriteriaId": "BFA49BD0-A5E2-4C30-AC63-BE29DA7FAE09", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11721:*:*:*:*:*:*", "matchCriteriaId": "CE86A970-CA23-4D79-A45B-6EB4B40F1115", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11722:*:*:*:*:*:*", "matchCriteriaId": "89EFFD76-21B9-47B2-B930-EEA16F43E719", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11723:*:*:*:*:*:*", "matchCriteriaId": "19FD422D-62EB-41B6-9C2B-F101E05D47D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11724:*:*:*:*:*:*", "matchCriteriaId": "D47E597C-5283-4E3B-91F8-84D1DB741F74", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11725:*:*:*:*:*:*", "matchCriteriaId": "899D6B5C-2F92-4818-BE1F-283B35BB5202", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11726:*:*:*:*:*:*", "matchCriteriaId": "D7D6FF79-DF89-48A2-A4D2-979E2EAB04FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11727:*:*:*:*:*:*", "matchCriteriaId": "C62CE9C0-E3D9-4921-BFF1-03AA724E6F4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11728:*:*:*:*:*:*", "matchCriteriaId": "4D09ACFF-5CD6-4BCA-BEA4-80C518130C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11729:*:*:*:*:*:*", "matchCriteriaId": "0184449D-38E4-4009-B82F-163ADE063B43", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11730:*:*:*:*:*:*", "matchCriteriaId": "AA83D6A7-7469-4D6E-9A5F-2F4B55D890AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11731:*:*:*:*:*:*", "matchCriteriaId": "237D0608-D964-4FFA-BA81-A6062243694B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11732:*:*:*:*:*:*", "matchCriteriaId": "8BDE1AC6-6D43-4240-A0C5-7C08A81B4B4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11733:*:*:*:*:*:*", "matchCriteriaId": "68BD39FE-A029-425C-910C-7913C30DF543", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11734:*:*:*:*:*:*", "matchCriteriaId": "3056FF6C-CA39-4698-857E-542A679B5B32", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11735:*:*:*:*:*:*", "matchCriteriaId": "BD224CFF-FAC7-4D20-BF6F-A95637EF4937", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11736:*:*:*:*:*:*", "matchCriteriaId": "F099C17C-FE9B-4BD7-A94C-AFB2C8652CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11737:*:*:*:*:*:*", "matchCriteriaId": "1E143AE7-E634-4BDC-872F-5BB9743B7397", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11738:*:*:*:*:*:*", "matchCriteriaId": "5D5B78EC-C727-4CD2-88CE-3919BB9ABC65", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11739:*:*:*:*:*:*", "matchCriteriaId": "75C5DFBA-90FB-4B89-A14B-A77B67479F64", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11740:*:*:*:*:*:*", "matchCriteriaId": "A82BBB20-A599-42CC-8456-65026B2475E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11741:*:*:*:*:*:*", "matchCriteriaId": "07998887-4AA2-4443-A03B-90A4D0B9D1AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11742:*:*:*:*:*:*", "matchCriteriaId": "BB128763-8F76-42AD-83A7-9522F744C104", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11743:*:*:*:*:*:*", "matchCriteriaId": "5D1D29F9-9644-4F05-AE0C-DCBD442653EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11744:*:*:*:*:*:*", "matchCriteriaId": "D7546EA5-3611-4ABF-81B0-1DDDF0A7A912", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11745:*:*:*:*:*:*", "matchCriteriaId": "56AF8C1E-E083-4BFE-9919-33BD33CD822F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11746:*:*:*:*:*:*", "matchCriteriaId": "F073F084-2AF7-4BD1-9F4A-28A77A5544EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11747:*:*:*:*:*:*", "matchCriteriaId": "00C1A4D2-632C-48B4-86B8-8A194C302D9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11748:*:*:*:*:*:*", "matchCriteriaId": "B690920E-7CA1-4BF5-8089-4F45746A7431", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11749:*:*:*:*:*:*", "matchCriteriaId": "648617E8-FDEF-4939-A2C6-58427A2F6D1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11750:*:*:*:*:*:*", "matchCriteriaId": "7AAFE53D-9A34-470F-9710-8FC49B93B378", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11751:*:*:*:*:*:*", "matchCriteriaId": "BBE9D6FA-80D8-4E38-B5BC-AE2CE9E6C5B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11752:*:*:*:*:*:*", "matchCriteriaId": "782A6D70-D4C2-48D8-95EC-F9CEB6656839", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11753:*:*:*:*:*:*", "matchCriteriaId": "CC10A8F2-B8DE-450F-973D-0BCC5D874A4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11754:*:*:*:*:*:*", "matchCriteriaId": "F062F668-B58E-41CB-9155-78E551D5572F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11755:*:*:*:*:*:*", "matchCriteriaId": "DACA6F99-2A04-49C1-B045-A809846BA034", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11756:*:*:*:*:*:*", "matchCriteriaId": "466C3060-50B6-4944-A7C1-7448E974E6C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11757:*:*:*:*:*:*", "matchCriteriaId": "FEE2B8A8-952E-47F2-AD8F-1AF4BDE21DBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11758:*:*:*:*:*:*", "matchCriteriaId": "F04DFA8E-EA5A-40B7-B8A2-B7974CED610F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11759:*:*:*:*:*:*", "matchCriteriaId": "D2171D95-EAE9-49DA-A671-11388140BFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11760:*:*:*:*:*:*", "matchCriteriaId": "397F3539-4704-4E42-BD21-6D504DD284F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11761:*:*:*:*:*:*", "matchCriteriaId": "F4574DFD-6293-4A4D-8BD6-C6F7E824AB54", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11762:*:*:*:*:*:*", "matchCriteriaId": "64C2C23A-99FA-4127-B170-B2A9F7C3D1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11763:*:*:*:*:*:*", "matchCriteriaId": "B49CF6DD-7298-420E-8627-517DA18C1B7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11764:*:*:*:*:*:*", "matchCriteriaId": "9421E876-A0CE-4414-93B7-F83D0382BE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11765:*:*:*:*:*:*", "matchCriteriaId": "A032190C-3CDF-4771-82F3-F61A7EDF0070", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11766:*:*:*:*:*:*", "matchCriteriaId": "334D629D-EFBE-41AF-A294-2940932BA1E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11767:*:*:*:*:*:*", "matchCriteriaId": "5F4DA79D-03D4-4A8C-851D-EBCD1C12C329", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11768:*:*:*:*:*:*", "matchCriteriaId": "91311D61-8457-4AFD-A57C-31905F8D43FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11769:*:*:*:*:*:*", "matchCriteriaId": "6F79BB96-085C-4063-B8A4-9F8548BF921D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11770:*:*:*:*:*:*", "matchCriteriaId": "A9AA93B0-4436-473F-96F1-19732AA3BB4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11771:*:*:*:*:*:*", "matchCriteriaId": "D9C1B58F-5FED-4861-80A1-B1D7135EE16B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11772:*:*:*:*:*:*", "matchCriteriaId": "3415512C-001F-4432-99D2-B2904786EEA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11773:*:*:*:*:*:*", "matchCriteriaId": "76528488-221F-4784-A167-9189851F5589", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11774:*:*:*:*:*:*", "matchCriteriaId": "1A76F3E6-D391-45A7-AB41-CF65EEC279C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11775:*:*:*:*:*:*", "matchCriteriaId": "B3904F39-56E5-457D-899C-7D02BBF76F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11776:*:*:*:*:*:*", "matchCriteriaId": "DD628233-86AF-4FC3-91EE-C67E46C8410B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11777:*:*:*:*:*:*", "matchCriteriaId": "5ED58AD7-A9C3-4268-A990-457D3965E520", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11778:*:*:*:*:*:*", "matchCriteriaId": "11CF8F4E-6744-40B9-83CE-8F2ED2229516", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11779:*:*:*:*:*:*", "matchCriteriaId": "DAA0D048-DBF3-4290-BF19-03384F020DDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11780:*:*:*:*:*:*", "matchCriteriaId": "1623C9AE-429F-4D80-A24B-AAD902604AA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11781:*:*:*:*:*:*", "matchCriteriaId": "EF6D255F-150A-4796-B22B-9030CBCF1278", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11782:*:*:*:*:*:*", "matchCriteriaId": "0DCD0C47-5C3A-4500-A3B9-72C520DB1A2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11783:*:*:*:*:*:*", "matchCriteriaId": "01A06B65-AD57-4934-A89B-1216F6AE31AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11784:*:*:*:*:*:*", "matchCriteriaId": "3DB5F118-975D-4571-B2E1-D78217E0506F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11785:*:*:*:*:*:*", "matchCriteriaId": "490C7D77-F6F8-43FD-B634-500F377E90F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11786:*:*:*:*:*:*", "matchCriteriaId": "B4AC1B00-7C9F-4D7F-A548-405924E73918", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11787:*:*:*:*:*:*", "matchCriteriaId": "9ECBE991-AB91-4032-BDBA-EA01DEF92C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11788:*:*:*:*:*:*", "matchCriteriaId": "E14AF610-5B39-408F-BBC4-8DB7BE5179E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11789:*:*:*:*:*:*", "matchCriteriaId": "EA5FCB78-6C05-4A91-B677-6BD72B9CD5F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11790:*:*:*:*:*:*", "matchCriteriaId": "F83D8FE1-4008-4892-AEA1-C0D532F71065", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11791:*:*:*:*:*:*", "matchCriteriaId": "438A9D78-7F25-42D9-94DB-348C954169C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11792:*:*:*:*:*:*", "matchCriteriaId": "BEA8882F-BD80-4669-82A0-2A5F6322A63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11793:*:*:*:*:*:*", "matchCriteriaId": "CA932181-6CAE-4189-979B-3553F4E5B4C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11794:*:*:*:*:*:*", "matchCriteriaId": "DEC1B5A7-C43B-45D6-A185-7C491DC4D7FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11795:*:*:*:*:*:*", "matchCriteriaId": "077BD548-104D-4DF4-AA36-92895E7A4A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11796:*:*:*:*:*:*", "matchCriteriaId": "D7CB7652-FB26-4A7F-B89E-A2DCFBA18E81", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11797:*:*:*:*:*:*", "matchCriteriaId": "5EAF1513-8B80-4A85-82A6-7FBE2BA5A3A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11798:*:*:*:*:*:*", "matchCriteriaId": "82FA25ED-5026-4129-AC1C-F18BB73E8D13", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11799:*:*:*:*:*:*", "matchCriteriaId": "29D3D4B9-2475-4026-A7FC-314229B85067", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11800:*:*:*:*:*:*", "matchCriteriaId": "69F38938-D976-4189-AE6A-1E7F43379694", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11801:*:*:*:*:*:*", "matchCriteriaId": "391EB300-09A1-4480-9019-405FD16BCDF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11802:*:*:*:*:*:*", "matchCriteriaId": "F344E4D5-3F53-45C7-9F2F-7BD6A22F1E43", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11803:*:*:*:*:*:*", "matchCriteriaId": "4C3D4348-CE49-44FE-B8BF-EBCE1B04FBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11804:*:*:*:*:*:*", "matchCriteriaId": "DF371FD2-D55D-4F8A-AAB4-C6356EE0F314", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11805:*:*:*:*:*:*", "matchCriteriaId": "BA0B7052-28A4-4B76-9551-654CD64512F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11806:*:*:*:*:*:*", "matchCriteriaId": "E9075308-310B-4587-8C1D-B739E78919D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11807:*:*:*:*:*:*", "matchCriteriaId": "5BAF9D0A-2A44-4DB7-8EF3-8FC150DF555B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11808:*:*:*:*:*:*", "matchCriteriaId": "9DB41562-6959-48A5-A1EF-A4D1EB0BBEB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11809:*:*:*:*:*:*", "matchCriteriaId": "F25DBDB4-8C33-4DFB-B1E3-87E3BF56E04B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11810:*:*:*:*:*:*", "matchCriteriaId": "64E87FEB-0856-418F-B3A3-AA09FD221071", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11811:*:*:*:*:*:*", "matchCriteriaId": "AED2BA6E-7760-479F-9AD7-C933D0DA0710", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11812:*:*:*:*:*:*", "matchCriteriaId": "F78EC2FB-8E0C-4192-B352-3765C98F930A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11813:*:*:*:*:*:*", "matchCriteriaId": "74B704AF-529C-4685-8B95-1A7EE3B9BB4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11814:*:*:*:*:*:*", "matchCriteriaId": "E9FA131C-63AA-4299-A3CC-2B7D51DC5FF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11815:*:*:*:*:*:*", "matchCriteriaId": "2D539769-C50D-4827-85DD-5369638CFD23", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11816:*:*:*:*:*:*", "matchCriteriaId": "90340365-3B0A-40A6-B7FA-53D2EE4CC82D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11817:*:*:*:*:*:*", "matchCriteriaId": "540F43B8-B551-448C-9642-A6D725D501D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11818:*:*:*:*:*:*", "matchCriteriaId": "2B1AD70E-ACE4-4F5F-9CB4-452C02847181", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11819:*:*:*:*:*:*", "matchCriteriaId": "E43586FF-6292-49CC-AC0C-ACF791215F3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11820:*:*:*:*:*:*", "matchCriteriaId": "E61D8982-4C18-453B-A013-FAAD0E7A1AF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11821:*:*:*:*:*:*", "matchCriteriaId": "C20A53D0-8D79-4333-8217-93B0D90140B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11822:*:*:*:*:*:*", "matchCriteriaId": "D6FDA060-5952-41B6-82A8-6DCC317C2E70", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11823:*:*:*:*:*:*", "matchCriteriaId": "B7E94326-DBF4-4FAC-9E85-B7CBD91678AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11824:*:*:*:*:*:*", "matchCriteriaId": "C6BED486-0CD3-4809-9538-1949F20651A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11825:*:*:*:*:*:*", "matchCriteriaId": "9BA0556D-79A5-47D0-A1AF-9494FDAF947E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11826:*:*:*:*:*:*", "matchCriteriaId": "F8776BC8-B56D-4A35-88C8-37DFDDE9B095", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11827:*:*:*:*:*:*", "matchCriteriaId": "9B4D9D0A-5EB5-4A61-B880-15B6C0676F52", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11828:*:*:*:*:*:*", "matchCriteriaId": "E01C4FFC-8EE6-4025-9596-AF2EA4DD97E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11829:*:*:*:*:*:*", "matchCriteriaId": "D0387E08-1ED9-44EE-8991-8EF9050AA403", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11830:*:*:*:*:*:*", "matchCriteriaId": "EB2B8518-042A-4CE0-BD98-5F58EE46C0C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11831:*:*:*:*:*:*", "matchCriteriaId": "2D08B479-2493-4AF6-B1AC-52C59B5FDA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11832:*:*:*:*:*:*", "matchCriteriaId": "5EA66F2E-5AEB-4EF7-8E8B-CFD54B37BB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11833:*:*:*:*:*:*", "matchCriteriaId": "B5D1A2F3-7126-4FF1-84CA-612D5EBB57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11834:*:*:*:*:*:*", "matchCriteriaId": "B506C059-63C7-43C1-8B00-BE18707C466A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11835:*:*:*:*:*:*", "matchCriteriaId": "D4B1B157-3D49-46EB-B222-E527FF4C64A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11836:*:*:*:*:*:*", "matchCriteriaId": "0ABC9A76-7C23-4E9E-A574-58CC49579C2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11837:*:*:*:*:*:*", "matchCriteriaId": "43A601A6-618D-4C7F-9557-6816ADC279E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11838:*:*:*:*:*:*", "matchCriteriaId": "319A82C0-39D0-4852-AF3A-0F5D216A41F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11839:*:*:*:*:*:*", "matchCriteriaId": "8B3C3C8E-57A8-44C1-AE8D-A914218F8298", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11840:*:*:*:*:*:*", "matchCriteriaId": "C711B676-0D59-449F-B12B-3074F8A63557", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11841:*:*:*:*:*:*", "matchCriteriaId": "12CAF794-F416-4E1A-8495-5ED643F64582", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11842:*:*:*:*:*:*", "matchCriteriaId": "9E54D78E-7084-4FA6-B54E-1A9341BAAC30", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11843:*:*:*:*:*:*", "matchCriteriaId": "A7DE706F-2ACB-4CF3-972E-3E8EF0E806CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11844:*:*:*:*:*:*", "matchCriteriaId": "5BD44B56-7951-47E8-ABD5-17C872CC0B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11845:*:*:*:*:*:*", "matchCriteriaId": "2AD674AF-383F-41AC-9379-8AFF96D8D983", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11846:*:*:*:*:*:*", "matchCriteriaId": "DCB66878-85BC-4FC0-BF12-9296E71AF58A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11847:*:*:*:*:*:*", "matchCriteriaId": "6EA1E674-AB24-48CB-A89B-4F1A2C93F60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11848:*:*:*:*:*:*", "matchCriteriaId": "B57E2EE5-CD8F-437F-A55B-A9F0CF1D7E6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11849:*:*:*:*:*:*", "matchCriteriaId": "6A3130C4-F769-4141-85C5-9320DEBB70A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11850:*:*:*:*:*:*", "matchCriteriaId": "272E03AC-D0D7-4249-B301-D0CA10F80918", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11851:*:*:*:*:*:*", "matchCriteriaId": "7BF069BC-BEE4-499E-B554-8F4D545E5239", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11852:*:*:*:*:*:*", "matchCriteriaId": "65956625-4327-44B3-BEEA-010C45681373", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11853:*:*:*:*:*:*", "matchCriteriaId": "341B9055-ECB6-4F93-A62B-97A553A3E343", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11854:*:*:*:*:*:*", "matchCriteriaId": "8CCAF50B-CD4F-427E-AFF5-CF774FDF029D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11855:*:*:*:*:*:*", "matchCriteriaId": "A1C2275E-CE14-47BB-B4FF-26DDD5323B4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11856:*:*:*:*:*:*", "matchCriteriaId": "774312B6-9F66-434C-8B63-7FA324EB45C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11857:*:*:*:*:*:*", "matchCriteriaId": "EE2EE079-1E25-4709-A58D-729BC3CD3100", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11858:*:*:*:*:*:*", "matchCriteriaId": "56E76D80-C157-469D-A40E-B5CDB46C3133", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11859:*:*:*:*:*:*", "matchCriteriaId": "9D133315-92E8-4E9A-B5FF-332E6B38A308", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:11860:*:*:*:*:*:*", "matchCriteriaId": "AE726650-3A6D-463F-81E2-BF92D498F701", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the Archive support module in ESET NOD32 before update 11861 allows remote attackers to execute arbitrary code via a large number of languages in an EPOC installation file of type SIS_FILE_MULTILANG." }, { "lang": "es", "value": "Desbordamiento de buffer basado en memoria din\u00e1mica en el m\u00f3dulo de soporte Archive en ESET NOD32 en versiones anteriores a la actualizaci\u00f3n 11861 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una gran cantidad de lenguajes en un archivo de instalaci\u00f3n EPOC de tipo SIS_FILE_MULTILANG." } ], "id": "CVE-2015-8841", "lastModified": "2024-11-21T02:39:17.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-12T01:59:28.287", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/136082/ESET-NOD32-Heap-Overflow.html" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://www.virusradar.com/en/update/info/11861" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=466" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/136082/ESET-NOD32-Heap-Overflow.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://www.virusradar.com/en/update/info/11861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=466" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201203-0383
Vulnerability from variot
The TAR file parser in Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, K7 AntiVirus 9.77.3565, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR The file parser contains a vulnerability that can bypass malware detection. CVE May be split intoBy a third party, MZ Has a character sequence that starts with POSIX TAR Via files, malware detection can be bypassed. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All affected products are command-line versions of the AVs.
Vulnerability Descriptions
Affected products - ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no - CVE-2012-1419
- Specially crafted infected ELF files with "ustar" at offset 257 evades detection.
Affected products - BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no - CVE-2012-1429 12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades detection. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades detection. Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1432
- Specially crafted infected MS EXE files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1433
- Specially crafted infected MS EXE files with "\19\04\00\10" at offset 8 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1434
- Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at offset 30 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1435
- Specially crafted infected MS EXE files with "\2D\6C\68" at offset 2 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1436
- Specially crafted infected MS Office files with "\50\4B\53\70\58" at offset 526 evades detection.
Affected products - Comodo 7425
CVE no - CVE-2012-1437
- Specially crafted infected MS Office files with "ustar" at offset 257 evades detection.
Affected products - Comodo 7425, Sophos 4.61.0
CVE no - CVE-2012-1438
- 'padding' field in ELF files is parsed incorrectly. If an infected ELF file's padding field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1439
- 'identsize' field in ELF files is parsed incorrectly. If an infected ELF file's identsize field is incremented by 1 it evades detection.
Affected products - Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1440
- 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1 it evades detection.
Affected products - Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0
CVE no - CVE-2012-1441
- 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades detection. Infected RAR files with initial two bytes set to 'MZ' can be fixed by the user and correctly extracted. Such a file evades detection. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0 nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no - CVE-2012-1443
- 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1444
- 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1445
- 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades detection. 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades detection.
Affected products - Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no - CVE-2012-1447
- 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0 TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no - CVE-2012-1448
- 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1449
- 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1450
- 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1451
- 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no - CVE-2012-1452
- 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades detection. 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades detection. 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1455
- A specially crafted ZIP file, created by concatenating the contents of a clean TAR archive and a virus-infected ZIP archive, is parsed incorrectly and evades detection. If the length field in the header of a file with test EICAR virus included into a TAR archive is set to be greater than the archive's total length (1,000,000+original length in our experiments), the antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program. A Windows Compiled HTML Help (CHM) file is a set of HTML files, scripts, and images compressed using the LZX algorithm. For faster random accesses, the algorithm is reset at intervals instead of compressing the entire file as a single stream. The length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval is lower than in the original file, the antivirus declares the file to be clean. But the Windows CHM viewer hh.exe correctly decompresses the infected content located before the tampered header.
Affected products - ClamAV 0.96.4, Sophos 4.61.0
CVE no - CVE-2012-1458
- In a POSIX TAR archive, each member file has a 512-byte header protected by a simple checksum. Every header also contains a file length field, which is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while the second is infected with test EICAR virus - and it is modified such that the length field in the header of the first, clean file to point into the middle of the header of the second, infected file. The antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, the antivirus declares the file to be clean but virus gets extracted by the gunzip+tar programs correctly by ignoring these bytes. GZIP files can contain multiple compressed streams, which are assembled when the contents are extracted. If an infected .tar.gz file is broken into two streams, the antivirus declares the infected .tar.gz file to be clean while tar+gunzip extract the virus correctly
Affected products - AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no - CVE-2012-1461
- If an infected ZIP archive is prepended with 1024 random bytes at the beginning, the antivirus declares the file to be clean but virus gets extracted by the unzip program correctly by skipping these bytes
Affected products - AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, Symantec 20101.3.0.103
CVE no - CVE-2012-1462
- In most ELF files, the 5th byte of the header indicates endianness: 01 for little-endian, 02 for bigendian. Linux kernel, however, does not check this field before loading an ELF file. If an infected ELF file's 5-th byte is set to 02, the antivirus declares the file to be clean but the ELF file gets executed correctly.
Affected products - AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no - CVE-2012-1463
Credits
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
References
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov To appear in IEEE Symposium on Security and Privacy 2012 http://www.ieee-security.org/TC/SP2012/
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0383", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "command antivirus", "scope": "eq", "trust": 2.4, "vendor": "authentium", "version": "5.2.11.5" }, { "model": "anti-malware", "scope": "eq", "trust": 1.8, "vendor": "emsisoft", "version": "5.1.0.1" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.8, "vendor": "eset", "version": "5795" }, { "model": "virus utilities t3 command line scanner", "scope": "eq", "trust": 1.8, "vendor": "ikarus", "version": "1.1.97.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "pc tools", "version": "7.0.3.5" }, { "model": "virusbuster", "scope": "eq", "trust": 1.8, "vendor": "virusbuster", "version": "13.6.151.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "antivirus \\\u0026 antispyware", "scope": "eq", "trust": 1.0, "vendor": "norman", "version": "6.06.12" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 1.0, "vendor": "f prot", "version": "4.6.2.117" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "k7computing", "version": "9.77.3565" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 0.8, "vendor": "frisk", "version": "4.6.2.117" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "k7 computing", "version": "9.77.3565" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "virusbuster", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "13.6.1510" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "pctools", "version": "7.0.35" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "norman", "version": "6.6.12" }, { "model": "computing pvt ltd k7antivirus", "scope": "eq", "trust": 0.3, "vendor": "k7", "version": "9.77.3565" }, { "model": "antivirus t3.1.1.97.0", "scope": null, "trust": 0.3, "vendor": "ikarus", "version": null }, { "model": "software f-prot antivirus", "scope": "eq", "trust": 0.3, "vendor": "frisk", "version": "4.6.2117" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.2.2540" }, { "model": "nod32", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11" }, { "model": "command antivirus", "scope": "eq", "trust": 0.3, "vendor": "authentium", "version": "5.2.115" } ], "sources": [ { "db": "BID", "id": "52588" }, { "db": "JVNDB", "id": "JVNDB-2012-001885" }, { "db": "CNNVD", "id": "CNNVD-201203-389" }, { "db": "NVD", "id": "CVE-2012-1423" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:authentium:command_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:rising-global:rising_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:emsisoft:anti-malware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:eset:nod32_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:f-prot:f-prot_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ikarus:ikarus_virus_utilities_t3_command_line_scanner", "vulnerable": true }, { "cpe22Uri": "cpe:/a:k7computing:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:norman:norman_antivirus_%26_antispyware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:pc_tools:pc_tools_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:virusbuster:virusbuster", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fortinet:fortinet_antivirus", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001885" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52588" } ], "trust": 0.3 }, "cve": "CVE-2012-1423", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2012-1423", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54704", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-1423", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-1423", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201203-389", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54704", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2012-1423", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54704" }, { "db": "VULMON", "id": "CVE-2012-1423" }, { "db": "JVNDB", "id": "JVNDB-2012-001885" }, { "db": "CNNVD", "id": "CNNVD-201203-389" }, { "db": "NVD", "id": "CVE-2012-1423" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The TAR file parser in Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, K7 AntiVirus 9.77.3565, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR The file parser contains a vulnerability that can bypass malware detection. CVE May be split intoBy a third party, MZ Has a character sequence that starts with POSIX TAR Via files, malware detection can be bypassed. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All \naffected products are command-line versions of \nthe AVs. \n\n----------------------------\nVulnerability Descriptions\n----------------------------\n\n1. \n\n Affected products -\n ClamAV 0.96.4, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1419\n\n2. Specially crafted infected ELF files with \"ustar\" at offset 257\n evades detection. \n\n Affected products -\n BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, \n McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01 \n\n CVE no - \n CVE-2012-1429\n12. Specially crafted infected ELF files with \"\\19\\04\\00\\10\" at offset 8 evades\n detection. Specially crafted infected ELF files with \"\\4a\\46\\49\\46\" at offset 6 evades\n detection. Specially crafted infected MS EXE files with \"\\57\\69\\6E\\5A\\69\\70\" at offset\n 29 evades detection. \n\n Affected products -\n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1432\n\n15. Specially crafted infected MS EXE files with \"\\4a\\46\\49\\46\" at offset\n 6 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1433\n\n16. Specially crafted infected MS EXE files with \"\\19\\04\\00\\10\" at offset\n 8 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, \n Panda 10.0.2.7\n \n CVE no - \n CVE-2012-1434\n\n17. Specially crafted infected MS EXE files with \"\\50\\4B\\4C\\49\\54\\45\" at \n offset 30 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1435\n\n18. Specially crafted infected MS EXE files with \"\\2D\\6C\\68\" at \n offset 2 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1436\n\n19. Specially crafted infected MS Office files with \"\\50\\4B\\53\\70\\58\" at \n offset 526 evades detection. \n \n Affected products - \n Comodo 7425\n \n CVE no - \n CVE-2012-1437\n\n20. Specially crafted infected MS Office files with \"ustar\" at \n offset 257 evades detection. \n\n Affected products - \n Comodo 7425, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1438\n\n21. \u0027padding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s padding field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1439\n\n22. \u0027identsize\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s identsize field is incremented by 1 it evades\n detection. \n\n Affected products - \n Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1440\n\n23. \u0027e_ip\u0027 and \u0027e_res\u0027 field in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n Prevx 3.0\n\n \u0027e_minalloc\u0027, \u0027e_res2\u0027,\u0027e_cparhdr\u0027, \u0027e_crlc\u0027, \u0027e_lfarlc\u0027,\u0027e_maxalloc\u0027,\n \u0027e_oeminfo\u0027, \u0027e_ovno\u0027, \u0027e_cs\u0027, \u0027e_csum\u0027,\u0027e_sp\u0027, \u0027e_ss\u0027, \u0027e_cblp\u0027 and \n \u0027e_oemid\u0027 fields in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0\n\n\n CVE no - \n CVE-2012-1441\n\n24. \u0027class\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s class field is incremented by 1 it evades\n detection. Infected RAR files with initial two bytes set to \u0027MZ\u0027 can be fixed by the \n user and correctly extracted. Such a file evades detection. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, \n Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, \n TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0\n nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, \n Avast5 5.0.677.0, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1443\n\n26. \u0027abiversion\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abiversion field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1444\n\n27. \u0027abi\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abi field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1445\n\n28. \u0027encoding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s encoding field is incremented by 1 it evades\n detection. \u0027e_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s e_version field is incremented by 1 it evades\n detection. \n\n Affected products -\n Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1447\n\n30. \u0027cbCabinet\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s cbCabinet field is incremented by 1 it evades\n detection. \n\n Affected products -\n CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0\n TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1 \n\n CVE no - \n CVE-2012-1448\n\n31. \u0027vMajor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s vMajor field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1449\n\n32. \u0027reserved3\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1450\n\n33. \u0027reserved2\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved2 field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1451\n\n34. \u0027reserved1\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1452\n\n35. \u0027coffFiles\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s coffFiles field is incremented by 1 it evades\n detection. \u0027ei_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s version field is incremented by 1 it evades\n detection. \u0027vMinor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1455\n\n38. A specially crafted ZIP file, created by concatenating the contents \n of a clean TAR archive and a virus-infected ZIP archive, is parsed \n incorrectly and evades detection. If the length field in the header of a file with test EICAR virus\n included into a TAR archive is set to be greater than the archive\u0027s total \n length (1,000,000+original length in our experiments), the antivirus \n declares the file to be clean but virus gets extracted correctly by the \n GNU tar program. A Windows Compiled HTML Help (CHM) file is a set of HTML files,\n scripts, and images compressed using the LZX algorithm. \n For faster random accesses, the algorithm is reset at intervals\n instead of compressing the entire file as a single stream. The\n length of each interval is specified in the LZXC header. \n\n If an infected CHM file\u0027s header modified so that the reset interval\n is lower than in the original file, the antivirus declares the file\n to be clean. But the Windows CHM viewer hh.exe correctly decompresses\n the infected content located before the tampered header. \n\n Affected products -\n ClamAV 0.96.4, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1458\n\n41. In a POSIX TAR archive, each member file has a 512-byte header protected\n by a simple checksum. Every header also contains a file length field, which\n is used by the extractor to locate the next header in the archive. \n\n If a TAR archive contains two files: the first one is clean, while\n the second is infected with test EICAR virus - and it is modified such that \n the length field in the header of the first, clean file to point into the \n middle of the header of the second, infected file. The antivirus declares \n the file to be clean but virus gets extracted correctly by the \n GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, \n the antivirus declares the file to be clean but virus gets extracted by\n the gunzip+tar programs correctly by ignoring these bytes. GZIP files can contain multiple compressed streams, which are assembled\n when the contents are extracted. If an infected .tar.gz file is broken \n into two streams, the antivirus declares the infected .tar.gz file to \n be clean while tar+gunzip extract the virus correctly\n\n Affected products -\n AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, \n F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, \n Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1461\n\n44. If an infected ZIP archive is prepended with 1024 random bytes at the \n beginning, the antivirus declares the file to be clean but virus gets extracted\n by the unzip program correctly by skipping these bytes\n\n Affected products -\n AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, \n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, \n Symantec 20101.3.0.103 \n\n CVE no - \n CVE-2012-1462\n\n45. In most ELF files, the 5th byte of the header indicates endianness: 01\n for little-endian, 02 for bigendian. Linux kernel, however, does not\n check this field before loading an ELF file. If an infected ELF file\u0027s 5-th \n byte is set to 02, the antivirus declares the file to be clean but the ELF \n file gets executed correctly. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, \n Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7 \n\n CVE no - \n CVE-2012-1463\n\n--------\nCredits\n--------\nVulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov. \n\n-----------\nReferences\n-----------\n\"Abusing File Processing in Malware Detectors for Fun and Profit\" by Suman Jana and Vitaly Shmatikov\nTo appear in IEEE Symposium on Security and Privacy 2012\nhttp://www.ieee-security.org/TC/SP2012/ \n", "sources": [ { "db": "NVD", "id": "CVE-2012-1423" }, { "db": "JVNDB", "id": "JVNDB-2012-001885" }, { "db": "BID", "id": "52588" }, { "db": "VULHUB", "id": "VHN-54704" }, { "db": "VULMON", "id": "CVE-2012-1423" }, { "db": "PACKETSTORM", "id": "110990" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1423", "trust": 3.0 }, { "db": "OSVDB", "id": "80396", "trust": 1.2 }, { "db": "OSVDB", "id": "80395", "trust": 1.2 }, { "db": "OSVDB", "id": "80393", "trust": 1.2 }, { "db": "OSVDB", "id": "80406", "trust": 1.2 }, { "db": "OSVDB", "id": "80407", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2012-001885", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-389", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "BID", "id": "52588", "trust": 0.5 }, { "db": "VULHUB", "id": "VHN-54704", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2012-1423", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110990", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54704" }, { "db": "VULMON", "id": "CVE-2012-1423" }, { "db": "BID", "id": "52588" }, { "db": "JVNDB", "id": "JVNDB-2012-001885" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "CNNVD", "id": "CNNVD-201203-389" }, { "db": "NVD", "id": "CVE-2012-1423" } ] }, "id": "VAR-201203-0383", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54704" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:46:23.474000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Command Antivirus", "trust": 0.8, "url": "http://www.authentium.com/command/CSAVDownload.html" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.emsisoft.com/en/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.eset.com/us/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.fortinet.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.f-prot.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ikarus.at/en/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.k7computing.com/en/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.norman.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.pctools.com/jp/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.virusbuster.hu/en/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001885" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54704" }, { "db": "JVNDB", "id": "JVNDB-2012-001885" }, { "db": "NVD", "id": "CVE-2012-1423" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.8, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.2, "url": "http://osvdb.org/80393" }, { "trust": 1.2, "url": "http://osvdb.org/80395" }, { "trust": 1.2, "url": "http://osvdb.org/80396" }, { "trust": 1.2, "url": "http://osvdb.org/80406" }, { "trust": 1.2, "url": "http://osvdb.org/80407" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1423" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1423" }, { "trust": 0.3, "url": "http://www.authentium.com" }, { "trust": 0.3, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "trust": 0.3, "url": "http://eset.com" }, { "trust": 0.3, "url": "http://www.fortinet.com/" }, { "trust": 0.3, "url": "http://www.f-prot.com/" }, { "trust": 0.3, "url": "http://www.ikarus.at" }, { "trust": 0.3, "url": "http://www.k7computing.com/en/product/k7-antivirusplus.php" }, { "trust": 0.3, "url": "http://anti-virus-software-review.toptenreviews.com/norman-review.html" }, { "trust": 0.3, "url": "http://www.pctools.com/spyware-doctor-antivirus/" }, { "trust": 0.3, "url": "http://www.rising-global.com/" }, { "trust": 0.3, "url": "http://www.trend.com" }, { "trust": 0.3, "url": "/archive/1/522005" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/264.html" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/52588" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1419" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1439" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1426" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1429" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1436" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1440" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1432" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1438" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1428" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1446" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1443" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1444" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1441" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1421" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1430" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1434" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1435" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1424" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1431" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1425" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1423" }, { "trust": 0.1, "url": "http://www.ieee-security.org/tc/sp2012/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1442" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1422" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1433" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1420" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1445" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1437" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54704" }, { "db": "VULMON", "id": "CVE-2012-1423" }, { "db": "BID", "id": "52588" }, { "db": "JVNDB", "id": "JVNDB-2012-001885" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "CNNVD", "id": "CNNVD-201203-389" }, { "db": "NVD", "id": "CVE-2012-1423" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54704" }, { "db": "VULMON", "id": "CVE-2012-1423" }, { "db": "BID", "id": "52588" }, { "db": "JVNDB", "id": "JVNDB-2012-001885" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "CNNVD", "id": "CNNVD-201203-389" }, { "db": "NVD", "id": "CVE-2012-1423" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54704" }, { "date": "2012-03-21T00:00:00", "db": "VULMON", "id": "CVE-2012-1423" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52588" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001885" }, { "date": "2012-03-19T23:51:01", "db": "PACKETSTORM", "id": "110990" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-389" }, { "date": "2012-03-21T10:11:47.317000", "db": "NVD", "id": "CVE-2012-1423" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-08-14T00:00:00", "db": "VULHUB", "id": "VHN-54704" }, { "date": "2012-08-14T00:00:00", "db": "VULMON", "id": "CVE-2012-1423" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52588" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001885" }, { "date": "2012-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-389" }, { "date": "2024-11-21T01:36:57.033000", "db": "NVD", "id": "CVE-2012-1423" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-389" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products TAR Vulnerability to bypass malware detection in file parser", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001885" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-389" } ], "trust": 0.6 } }
var-201203-0364
Vulnerability from variot
The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By a third party \7fELF ( backslash 7fELF) Has a character sequence starting with POSIX TAR Malware detection may be avoided via files. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All affected products are command-line versions of the AVs.
Vulnerability Descriptions
- Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes evades detection.
Affected products - ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no - CVE-2012-1419
- Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, Rising 22.83.00.03
CVE no - CVE-2012-1420
- Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, Symantec 20101.3.0.103
CVE no - CVE-2012-1421
- Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1422
- Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes evades detection.
Affected products - Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no - CVE-2012-1423
- Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8 evades detection.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, PCTools 7.0.3.5, Sophos 4.61.0
CVE no - CVE-2012-1424
- Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first 4 bytes evades detection.
Affected products - AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1, Fortinet 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no - CVE-2012-1425
- Specially crafted infected POSIX TAR files with "\42\5A\68" as the first 3 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1426
- Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1427
- Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1428
- Specially crafted infected ELF files with "ustar" at offset 257 evades detection.
Affected products - BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no - CVE-2012-1429 12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades detection.
Affected products - BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no - CVE-2012-1430 13. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no - CVE-2012-1431
- Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1432
- Specially crafted infected MS EXE files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1433
- Specially crafted infected MS EXE files with "\19\04\00\10" at offset 8 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1434
- Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at offset 30 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1435
- Specially crafted infected MS EXE files with "\2D\6C\68" at offset 2 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1436
- Specially crafted infected MS Office files with "\50\4B\53\70\58" at offset 526 evades detection.
Affected products - Comodo 7425
CVE no - CVE-2012-1437
- Specially crafted infected MS Office files with "ustar" at offset 257 evades detection.
Affected products - Comodo 7425, Sophos 4.61.0
CVE no - CVE-2012-1438
- 'padding' field in ELF files is parsed incorrectly. If an infected ELF file's padding field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1439
- 'identsize' field in ELF files is parsed incorrectly. If an infected ELF file's identsize field is incremented by 1 it evades detection.
Affected products - Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1440
- 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1 it evades detection.
Affected products - Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0
CVE no - CVE-2012-1441
- 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0, Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1442
- Infected RAR files with initial two bytes set to 'MZ' can be fixed by the user and correctly extracted. Such a file evades detection.
Affected products - ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0 nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no - CVE-2012-1443
- 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1444
- 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1445
- 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, McAfee 5.400.0.1158, Symantec 20101.3.0.103, Norman 6.06.12, eSafe 7.0.017.0, Kaspersky 7.0.0.125, McAfee-GW-Edition 2010.1C, Sophos 4.61.0, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, PCTools 7.0.3.5, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1446
- 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades detection.
Affected products - Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no - CVE-2012-1447
- 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0 TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no - CVE-2012-1448
- 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1449
- 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1450
- 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1451
- 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no - CVE-2012-1452
- 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades detection.
Affected products - McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125, Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C, Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402, Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1453
- 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades detection.
Affected products - McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1454
- 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1455
- A specially crafted ZIP file, created by concatenating the contents of a clean TAR archive and a virus-infected ZIP archive, is parsed incorrectly and evades detection.
Affected products - AVG 10.0.0.1190, CAT-QuickHeal 11.00, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117,Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no - CVE-2012-1456
- If the length field in the header of a file with test EICAR virus included into a TAR archive is set to be greater than the archive's total length (1,000,000+original length in our experiments), the antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program.
Affected products - AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no - CVE-2012-1457
- A Windows Compiled HTML Help (CHM) file is a set of HTML files, scripts, and images compressed using the LZX algorithm. For faster random accesses, the algorithm is reset at intervals instead of compressing the entire file as a single stream. The length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval is lower than in the original file, the antivirus declares the file to be clean. But the Windows CHM viewer hh.exe correctly decompresses the infected content located before the tampered header.
Affected products - ClamAV 0.96.4, Sophos 4.61.0
CVE no - CVE-2012-1458
- In a POSIX TAR archive, each member file has a 512-byte header protected by a simple checksum. Every header also contains a file length field, which is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while the second is infected with test EICAR virus - and it is modified such that the length field in the header of the first, clean file to point into the middle of the header of the second, infected file. The antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, the antivirus declares the file to be clean but virus gets extracted by the gunzip+tar programs correctly by ignoring these bytes.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no - CVE-2012-1460
- GZIP files can contain multiple compressed streams, which are assembled when the contents are extracted. If an infected .tar.gz file is broken into two streams, the antivirus declares the infected .tar.gz file to be clean while tar+gunzip extract the virus correctly
Affected products - AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no - CVE-2012-1461
- If an infected ZIP archive is prepended with 1024 random bytes at the beginning, the antivirus declares the file to be clean but virus gets extracted by the unzip program correctly by skipping these bytes
Affected products - AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, Symantec 20101.3.0.103
CVE no - CVE-2012-1462
- In most ELF files, the 5th byte of the header indicates endianness: 01 for little-endian, 02 for bigendian. Linux kernel, however, does not check this field before loading an ELF file. If an infected ELF file's 5-th byte is set to 02, the antivirus declares the file to be clean but the ELF file gets executed correctly.
Affected products - AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no - CVE-2012-1463
Credits
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
References
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov To appear in IEEE Symposium on Security and Privacy 2012 http://www.ieee-security.org/TC/SP2012/
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0364", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "command antivirus", "scope": "eq", "trust": 1.8, "vendor": "authentium", "version": "5.2.11.5" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "quick heal", "scope": "eq", "trust": 1.6, "vendor": "cat", "version": "11.00" }, { "model": "antivirus \\\u0026 antispyware", "scope": "eq", "trust": 1.0, "vendor": "norman", "version": "6.06.12" }, { "model": "panda antivirus", "scope": "eq", "trust": 1.0, "vendor": "pandasecurity", "version": "10.0.2.7" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "security essentials", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "2.0" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 1.0, "vendor": "f prot", "version": "4.6.2.117" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "k7computing", "version": "9.77.3565" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "nod32 anti-virus", "scope": "eq", "trust": 0.8, "vendor": "eset", "version": "5795" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 0.8, "vendor": "frisk", "version": "4.6.2.117" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "k7 computing", "version": "9.77.3565" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "panda security", "version": "10.0.2.7" }, { "model": "heal", "scope": "eq", "trust": 0.8, "vendor": "quick heal k k", "version": "11.00" }, { "model": "security essentials", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "2.0 antimalware engine 1.1.6402.0" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "cat-quickheal", "scope": "eq", "trust": 0.3, "vendor": "quick heal", "version": "11.00" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "10.0.27" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "norman", "version": "6.6.12" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1.6402" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "7.0125" }, { "model": "computing pvt ltd k7antivirus", "scope": "eq", "trust": 0.3, "vendor": "k7", "version": "9.77.3565" }, { "model": "software f-prot antivirus", "scope": "eq", "trust": 0.3, "vendor": "frisk", "version": "4.6.2117" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.2.2540" }, { "model": "nod32", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "5795" }, { "model": "command antivirus", "scope": "eq", "trust": 0.3, "vendor": "authentium", "version": "5.2.115" } ], "sources": [ { "db": "BID", "id": "52615" }, { "db": "JVNDB", "id": "JVNDB-2012-001882" }, { "db": "CNNVD", "id": "CNNVD-201203-387" }, { "db": "NVD", "id": "CVE-2012-1420" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:authentium:command_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:rising-global:rising_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:eset:nod32_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:f-prot:f-prot_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:k7computing:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:norman:norman_antivirus_%26_antispyware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:pandasecurity:panda_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:kaspersky:kaspersky_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:quick_heal:quick_heal", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fortinet:fortinet_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:microsoft:security_essentials", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001882" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52615" } ], "trust": 0.3 }, "cve": "CVE-2012-1420", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2012-1420", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54701", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-1420", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-1420", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201203-387", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54701", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54701" }, { "db": "JVNDB", "id": "JVNDB-2012-001882" }, { "db": "CNNVD", "id": "CNNVD-201203-387" }, { "db": "NVD", "id": "CVE-2012-1420" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \\7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By a third party \\7fELF ( backslash 7fELF) Has a character sequence starting with POSIX TAR Malware detection may be avoided via files. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All \naffected products are command-line versions of \nthe AVs. \n\n----------------------------\nVulnerability Descriptions\n----------------------------\n\n1. Specially crafted infected POSIX TAR files with \"[aliases]\" as first 9 bytes \n evades detection. \n\n Affected products -\n ClamAV 0.96.4, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1419\n\n2. Specially crafted infected POSIX TAR files with \"\\7fELF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, \n Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1420\n\n3. Specially crafted infected POSIX TAR files with \"MSCF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, \n Symantec 20101.3.0.103\n\n CVE no - \n CVE-2012-1421\n\n4. Specially crafted infected POSIX TAR files with \"ITSF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1422\n\n5. Specially crafted infected POSIX TAR files with \"MZ\" as first 2 bytes \n evades detection. \n\n Affected products -\n Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, \n Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, \n PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0\n\n CVE no - \n CVE-2012-1423\n\n6. Specially crafted infected POSIX TAR files with \"\\19\\04\\00\\10\" at offset 8\n evades detection. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, \n PCTools 7.0.3.5, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1424\n\n\n7. Specially crafted infected POSIX TAR files with \"\\50\\4B\\03\\04\" as the first\n 4 bytes evades detection. \n\n Affected products -\n AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1,\n Fortinet 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, \n Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004 \n\n CVE no - \n CVE-2012-1425\n\n8. Specially crafted infected POSIX TAR files with \"\\42\\5A\\68\" as the first\n 3 bytes evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1426\n\n\n9. Specially crafted infected POSIX TAR files with \"\\57\\69\\6E\\5A\\69\\70\" at \n offset 29 evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1427\n\n10. Specially crafted infected POSIX TAR files with \"\\4a\\46\\49\\46\" at offset 6\n evades detection. \n \n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1428\n\n11. Specially crafted infected ELF files with \"ustar\" at offset 257\n evades detection. \n\n Affected products -\n BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, \n McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01 \n\n CVE no - \n CVE-2012-1429\n12. Specially crafted infected ELF files with \"\\19\\04\\00\\10\" at offset 8 evades\n detection. \n\n Affected products -\n BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, \n Sophos 4.61.0, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1430\n13. Specially crafted infected ELF files with \"\\4a\\46\\49\\46\" at offset 6 evades\n detection. \n\n Affected products -\n BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, \n F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, \n nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1431\n\n14. Specially crafted infected MS EXE files with \"\\57\\69\\6E\\5A\\69\\70\" at offset\n 29 evades detection. \n\n Affected products -\n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1432\n\n15. Specially crafted infected MS EXE files with \"\\4a\\46\\49\\46\" at offset\n 6 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1433\n\n16. Specially crafted infected MS EXE files with \"\\19\\04\\00\\10\" at offset\n 8 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, \n Panda 10.0.2.7\n \n CVE no - \n CVE-2012-1434\n\n17. Specially crafted infected MS EXE files with \"\\50\\4B\\4C\\49\\54\\45\" at \n offset 30 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1435\n\n18. Specially crafted infected MS EXE files with \"\\2D\\6C\\68\" at \n offset 2 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1436\n\n19. Specially crafted infected MS Office files with \"\\50\\4B\\53\\70\\58\" at \n offset 526 evades detection. \n \n Affected products - \n Comodo 7425\n \n CVE no - \n CVE-2012-1437\n\n20. Specially crafted infected MS Office files with \"ustar\" at \n offset 257 evades detection. \n\n Affected products - \n Comodo 7425, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1438\n\n21. \u0027padding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s padding field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1439\n\n22. \u0027identsize\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s identsize field is incremented by 1 it evades\n detection. \n\n Affected products - \n Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1440\n\n23. \u0027e_ip\u0027 and \u0027e_res\u0027 field in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n Prevx 3.0\n\n \u0027e_minalloc\u0027, \u0027e_res2\u0027,\u0027e_cparhdr\u0027, \u0027e_crlc\u0027, \u0027e_lfarlc\u0027,\u0027e_maxalloc\u0027,\n \u0027e_oeminfo\u0027, \u0027e_ovno\u0027, \u0027e_cs\u0027, \u0027e_csum\u0027,\u0027e_sp\u0027, \u0027e_ss\u0027, \u0027e_cblp\u0027 and \n \u0027e_oemid\u0027 fields in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0\n\n\n CVE no - \n CVE-2012-1441\n\n24. \u0027class\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s class field is incremented by 1 it evades\n detection. \n\n Affected products - \n CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0, \n Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1442\n\n25. Infected RAR files with initial two bytes set to \u0027MZ\u0027 can be fixed by the \n user and correctly extracted. Such a file evades detection. \n \n Affected products -\n ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, \n Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, \n Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, \n VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, \n K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 \n Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, \n Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, \n TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0\n nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, \n Avast5 5.0.677.0, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1443\n\n26. \u0027abiversion\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abiversion field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1444\n\n27. \u0027abi\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abi field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1445\n\n28. \u0027encoding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s encoding field is incremented by 1 it evades\n detection. \n\n Affected products - \n CAT-QuickHeal 11.00, McAfee 5.400.0.1158, Symantec 20101.3.0.103, \n Norman 6.06.12, eSafe 7.0.017.0, Kaspersky 7.0.0.125, \n McAfee-GW-Edition 2010.1C, Sophos 4.61.0, eTrust-Vet 36.1.8511, \n Antiy-AVL 2.0.3.7, PCTools 7.0.3.5, Rising 22.83.00.03, Fortinet 4.2.254.0,\n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1446\n\n29. \u0027e_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s e_version field is incremented by 1 it evades\n detection. \n\n Affected products -\n Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1447\n\n30. \u0027cbCabinet\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s cbCabinet field is incremented by 1 it evades\n detection. \n\n Affected products -\n CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0\n TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1 \n\n CVE no - \n CVE-2012-1448\n\n31. \u0027vMajor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s vMajor field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1449\n\n32. \u0027reserved3\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1450\n\n33. \u0027reserved2\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved2 field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1451\n\n34. \u0027reserved1\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1452\n\n35. \u0027coffFiles\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s coffFiles field is incremented by 1 it evades\n detection. \n\n Affected products -\n McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125, \n Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C,\n Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402,\n Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1453\n\n36. \u0027ei_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C, \n Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1454\n\n37. \u0027vMinor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1455\n\n38. A specially crafted ZIP file, created by concatenating the contents \n of a clean TAR archive and a virus-infected ZIP archive, is parsed \n incorrectly and evades detection. \n\n Affected products -\n AVG 10.0.0.1190, CAT-QuickHeal 11.00, Comodo 7424, Emsisoft 5.1.0.1,\n eSafe 7.0.17.0, F-Prot 4.6.2.117,Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, \n McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, \n Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004\n\n CVE no - \n CVE-2012-1456\n\n39. If the length field in the header of a file with test EICAR virus\n included into a TAR archive is set to be greater than the archive\u0027s total \n length (1,000,000+original length in our experiments), the antivirus \n declares the file to be clean but virus gets extracted correctly by the \n GNU tar program. \n\n Affected products -\n AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, \n AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, \n Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, \n GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, \n Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, \n Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, \n TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0 \n\n CVE no - \n CVE-2012-1457\n\n40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,\n scripts, and images compressed using the LZX algorithm. \n For faster random accesses, the algorithm is reset at intervals\n instead of compressing the entire file as a single stream. The\n length of each interval is specified in the LZXC header. \n\n If an infected CHM file\u0027s header modified so that the reset interval\n is lower than in the original file, the antivirus declares the file\n to be clean. But the Windows CHM viewer hh.exe correctly decompresses\n the infected content located before the tampered header. \n\n Affected products -\n ClamAV 0.96.4, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1458\n\n41. In a POSIX TAR archive, each member file has a 512-byte header protected\n by a simple checksum. Every header also contains a file length field, which\n is used by the extractor to locate the next header in the archive. \n\n If a TAR archive contains two files: the first one is clean, while\n the second is infected with test EICAR virus - and it is modified such that \n the length field in the header of the first, clean file to point into the \n middle of the header of the second, infected file. The antivirus declares \n the file to be clean but virus gets extracted correctly by the \n GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, \n the antivirus declares the file to be clean but virus gets extracted by\n the gunzip+tar programs correctly by ignoring these bytes. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, \n eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, \n K7AntiVirus 9.77.3565, VBA32 3.12.14.2 \n \n CVE no - \n CVE-2012-1460\n\n43. GZIP files can contain multiple compressed streams, which are assembled\n when the contents are extracted. If an infected .tar.gz file is broken \n into two streams, the antivirus declares the infected .tar.gz file to \n be clean while tar+gunzip extract the virus correctly\n\n Affected products -\n AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, \n F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, \n Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1461\n\n44. If an infected ZIP archive is prepended with 1024 random bytes at the \n beginning, the antivirus declares the file to be clean but virus gets extracted\n by the unzip program correctly by skipping these bytes\n\n Affected products -\n AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, \n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, \n Symantec 20101.3.0.103 \n\n CVE no - \n CVE-2012-1462\n\n45. In most ELF files, the 5th byte of the header indicates endianness: 01\n for little-endian, 02 for bigendian. Linux kernel, however, does not\n check this field before loading an ELF file. If an infected ELF file\u0027s 5-th \n byte is set to 02, the antivirus declares the file to be clean but the ELF \n file gets executed correctly. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, \n Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7 \n\n CVE no - \n CVE-2012-1463\n\n--------\nCredits\n--------\nVulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov. \n\n-----------\nReferences\n-----------\n\"Abusing File Processing in Malware Detectors for Fun and Profit\" by Suman Jana and Vitaly Shmatikov\nTo appear in IEEE Symposium on Security and Privacy 2012\nhttp://www.ieee-security.org/TC/SP2012/ \n", "sources": [ { "db": "NVD", "id": "CVE-2012-1420" }, { "db": "JVNDB", "id": "JVNDB-2012-001882" }, { "db": "BID", "id": "52615" }, { "db": "VULHUB", "id": "VHN-54701" }, { "db": "PACKETSTORM", "id": "110990" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1420", "trust": 2.9 }, { "db": "OSVDB", "id": "80409", "trust": 1.1 }, { "db": "OSVDB", "id": "80406", "trust": 1.1 }, { "db": "OSVDB", "id": "80407", "trust": 1.1 }, { "db": "OSVDB", "id": "80403", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001882", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-387", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19230", "trust": 0.6 }, { "db": "BID", "id": "52615", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-54701", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110990", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54701" }, { "db": "BID", "id": "52615" }, { "db": "JVNDB", "id": "JVNDB-2012-001882" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "CNNVD", "id": "CNNVD-201203-387" }, { "db": "NVD", "id": "CVE-2012-1420" } ] }, "id": "VAR-201203-0364", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54701" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:46:23.814000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Command Antivirus", "trust": 0.8, "url": "http://www.authentium.com/command/CSAVDownload.html" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.eset.com/us/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.fortinet.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.f-prot.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.k7computing.com/en/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.norman.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.pandasecurity.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.quickheal.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.kaspersky.co.jp/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.microsoft.com/ja-jp/default.aspx" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001882" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54701" }, { "db": "JVNDB", "id": "JVNDB-2012-001882" }, { "db": "NVD", "id": "CVE-2012-1420" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://osvdb.org/80403" }, { "trust": 1.1, "url": "http://osvdb.org/80406" }, { "trust": 1.1, "url": "http://osvdb.org/80407" }, { "trust": 1.1, "url": "http://osvdb.org/80409" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1420" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1420" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19230" }, { "trust": 0.3, "url": "http://www.authentium.com" }, { "trust": 0.3, "url": "http://eset.com" }, { "trust": 0.3, "url": "http://www.fortinet.com/" }, { "trust": 0.3, "url": "http://www.f-prot.com/" }, { "trust": 0.3, "url": "http://www.k7computing.com/en/product/k7-antivirusplus.php" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.microsoft.com" }, { "trust": 0.3, "url": "http://anti-virus-software-review.toptenreviews.com/norman-review.html" }, { "trust": 0.3, "url": "http://www.pandasecurity.com/usa/" }, { "trust": 0.3, "url": "http://www.quickheal.com/" }, { "trust": 0.3, "url": "http://www.rising-global.com/" }, { "trust": 0.3, "url": "/archive/1/522005" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1419" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1439" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1426" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1429" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1436" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1440" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1432" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1438" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1428" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1446" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1443" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1444" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1441" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1421" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1430" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1434" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1435" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1424" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1431" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1425" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1423" }, { "trust": 0.1, "url": "http://www.ieee-security.org/tc/sp2012/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1442" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1422" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1433" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1420" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1445" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1437" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54701" }, { "db": "BID", "id": "52615" }, { "db": "JVNDB", "id": "JVNDB-2012-001882" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "CNNVD", "id": "CNNVD-201203-387" }, { "db": "NVD", "id": "CVE-2012-1420" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54701" }, { "db": "BID", "id": "52615" }, { "db": "JVNDB", "id": "JVNDB-2012-001882" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "CNNVD", "id": "CNNVD-201203-387" }, { "db": "NVD", "id": "CVE-2012-1420" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54701" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52615" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001882" }, { "date": "2012-03-19T23:51:01", "db": "PACKETSTORM", "id": "110990" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-387" }, { "date": "2012-03-21T10:11:47.130000", "db": "NVD", "id": "CVE-2012-1420" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-08-14T00:00:00", "db": "VULHUB", "id": "VHN-54701" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52615" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001882" }, { "date": "2012-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-387" }, { "date": "2024-11-21T01:36:56.607000", "db": "NVD", "id": "CVE-2012-1420" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-387" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products TAR Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001882" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-387" } ], "trust": 0.6 } }
var-201203-0381
Vulnerability from variot
The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By a third party TAR Total file size exceeded length With field TAR Malware detection can be bypassed via archive entries. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Vulnerabilities exist in the TAR file parser in version 1004, Trend Micro HouseCall version 9.120.0.1004, VBA32 version 3.12.14.2, and VirusBuster version 13.6.151.0. ============================================================================ Ubuntu Security Notice USN-1482-1 June 19, 2012
clamav vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.04 LTS
Summary:
ClamAV could improperly detect malware if it opened a specially crafted file.
Software Description: - clamav: Anti-virus utility for Unix
Details:
It was discovered that ClamAV incorrectly handled certain malformed TAR archives. (CVE-2012-1457, CVE-2012-1459)
It was discovered that ClamAV incorrectly handled certain malformed CHM files. (CVE-2012-1458)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 LTS: clamav 0.97.5+dfsg-1ubuntu0.12.04.1 clamav-daemon 0.97.5+dfsg-1ubuntu0.12.04.1 libclamav6 0.97.5+dfsg-1ubuntu0.12.04.1
Ubuntu 11.10: clamav 0.97.5+dfsg-1ubuntu0.11.10.1 clamav-daemon 0.97.5+dfsg-1ubuntu0.11.10.1 libclamav6 0.97.5+dfsg-1ubuntu0.11.10.1
Ubuntu 11.04: clamav 0.97.5+dfsg-1ubuntu0.11.04.1 clamav-daemon 0.97.5+dfsg-1ubuntu0.11.04.1 libclamav6 0.97.5+dfsg-1ubuntu0.11.04.1
Ubuntu 10.04 LTS: clamav 0.96.5+dfsg-1ubuntu1.10.04.4 clamav-daemon 0.96.5+dfsg-1ubuntu1.10.04.4 libclamav6 0.96.5+dfsg-1ubuntu1.10.04.4
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1482-1 CVE-2012-1457, CVE-2012-1458, CVE-2012-1459
Package Information: https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.1 https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.1 https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.1 https://launchpad.net/ubuntu/+source/clamav/0.96.5+dfsg-1ubuntu1.10.04.4 .
The Microsoft CHM file parser in ClamAV 0.96.4 allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459 http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=clamav-0.97.5
Updated Packages:
Mandriva Enterprise Server 5: d82d78601290e2f6073974170c81841a mes5/i586/clamav-0.97.5-0.1mdvmes5.2.i586.rpm 80f0475472c0217afd3727019bf27e53 mes5/i586/clamav-db-0.97.5-0.1mdvmes5.2.i586.rpm c13835eadea8d2af15b628fba3159e8b mes5/i586/clamav-milter-0.97.5-0.1mdvmes5.2.i586.rpm d7c058fae32f1a081b1d4ca31157df0e mes5/i586/clamd-0.97.5-0.1mdvmes5.2.i586.rpm 5ad153709c7eb510c2be2e82bfa5ac52 mes5/i586/libclamav6-0.97.5-0.1mdvmes5.2.i586.rpm 96e3d3f3e9bea802c4109c155c9d1465 mes5/i586/libclamav-devel-0.97.5-0.1mdvmes5.2.i586.rpm 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64: b30f5aafd9aaff0a7743fb62f33ccbea mes5/x86_64/clamav-0.97.5-0.1mdvmes5.2.x86_64.rpm 1508801239427c0ac72734f52cb4451c mes5/x86_64/clamav-db-0.97.5-0.1mdvmes5.2.x86_64.rpm 92b4c5ca6db656801b5b6ae217c6e171 mes5/x86_64/clamav-milter-0.97.5-0.1mdvmes5.2.x86_64.rpm 94fad12df2cc900309087bbda13c826a mes5/x86_64/clamd-0.97.5-0.1mdvmes5.2.x86_64.rpm 8ec166a457d0512479adaaf5f80d487f mes5/x86_64/lib64clamav6-0.97.5-0.1mdvmes5.2.x86_64.rpm 19bc2758175bcde28ebf7783d68a9b98 mes5/x86_64/lib64clamav-devel-0.97.5-0.1mdvmes5.2.x86_64.rpm 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFP3tnKmqjQ0CJFipgRAj4wAJ9eURS1mZYCZhkmUTVE/U8QAH47MwCgxQzf OUr1QL5Wsvt3KboLKCdYUhE= =1QL7 -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0381", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "virusbuster", "scope": "eq", "trust": 2.4, "vendor": "virusbuster", "version": "13.6.151.0" }, { "model": "avl sdk", "scope": "eq", "trust": 1.8, "vendor": "antiy", "version": "2.0.3.7" }, { "model": "command antivirus", "scope": "eq", "trust": 1.8, "vendor": "authentium", "version": "5.2.11.5" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "avg", "version": "10.0.0.1190" }, { "model": "bitdefender", "scope": "eq", "trust": 1.8, "vendor": "bitdefender", "version": "7.2" }, { "model": "clamav", "scope": "eq", "trust": 1.8, "vendor": "clamav", "version": "0.96.4" }, { "model": "anti-malware", "scope": "eq", "trust": 1.8, "vendor": "emsisoft", "version": "5.1.0.1" }, { "model": "virus utilities t3 command line scanner", "scope": "eq", "trust": 1.8, "vendor": "ikarus", "version": "1.1.97.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "pc tools", "version": "7.0.3.5" }, { "model": "esafe", "scope": "eq", "trust": 1.8, "vendor": "aladdin", "version": "7.0.17.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "security essentials", "scope": "eq", "trust": 1.8, "vendor": "microsoft", "version": "2.0" }, { "model": "scan engine", "scope": "eq", "trust": 1.8, "vendor": "mcafee", "version": "5.400.0.1158" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "5.0.677.0" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "4.8.1351.0" }, { "model": "trend micro antivirus", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "g data antivirus", "scope": "eq", "trust": 1.0, "vendor": "gdata", "version": "21" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "k7computing", "version": "9.77.3565" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "5795" }, { "model": "vba32", "scope": "eq", "trust": 1.0, "vendor": "anti virus", "version": "3.12.14.2" }, { "model": "endpoint protection", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "11.0" }, { "model": "housecall", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "antivirus \\\u0026 antispyware", "scope": "eq", "trust": 1.0, "vendor": "norman", "version": "6.06.12" }, { "model": "quick heal", "scope": "eq", "trust": 1.0, "vendor": "cat", "version": "11.00" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 1.0, "vendor": "f prot", "version": "4.6.2.117" }, { "model": "antivir", "scope": "eq", "trust": 1.0, "vendor": "avira", "version": "7.11.1.163" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "4.8.1351.0" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "5.0.677.0" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "avira", "version": "7.11.1.163" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "nod32 anti-virus", "scope": "eq", "trust": 0.8, "vendor": "eset", "version": "5795" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 0.8, "vendor": "frisk", "version": "4.6.2.117" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "g data", "version": "21" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "k7 computing", "version": "9.77.3565" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "vba32", "scope": "eq", "trust": 0.8, "vendor": "virusblokada", "version": "3.12.14.2" }, { "model": "heal", "scope": "eq", "trust": 0.8, "vendor": "quick heal k k", "version": "11.00" }, { "model": "endpoint protection", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "11" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "housecall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "vba32", "scope": "eq", "trust": 0.3, "vendor": "virusblokada", "version": "3.12.142" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "virusbuster", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "13.6.1510" }, { "model": "trend micro", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "housecall", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20101.3103" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "12.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11.4" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "cat-quickheal", "scope": "eq", "trust": 0.3, "vendor": "quick heal", "version": "11.00" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "pctools", "version": "7.0.35" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "norman", "version": "6.6.12" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1.6402" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "7.0125" }, { "model": "computing pvt ltd k7antivirus", "scope": "eq", "trust": 0.3, "vendor": "k7", "version": "9.77.3565" }, { "model": "jiangmin", "scope": "eq", "trust": 0.3, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus t3.1.1.97.0", "scope": null, "trust": 0.3, "vendor": "ikarus", "version": null }, { "model": "data software gdata", "scope": "eq", "trust": 0.3, "vendor": "g", "version": "21" }, { "model": "software f-prot antivirus", "scope": "eq", "trust": 0.3, "vendor": "frisk", "version": "4.6.2117" }, { "model": "nod32", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "esafe", "version": "7.0.170" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "bitdefender", "version": "7.2" }, { "model": "antivir engine", "scope": "eq", "trust": 0.3, "vendor": "avira", "version": "7.11.1163" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "avg", "version": "10.01190" }, { "model": "avast5 antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "5.0.6770" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.8.1351.0" }, { "model": "command antivirus", "scope": "eq", "trust": 0.3, "vendor": "authentium", "version": "5.2.115" }, { "model": "antiy-avl", "scope": "eq", "trust": 0.3, "vendor": "antiy", "version": "2.0.37" } ], "sources": [ { "db": "BID", "id": "52610" }, { "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "db": "CNNVD", "id": "CNNVD-201203-420" }, { "db": "NVD", "id": "CVE-2012-1457" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:antiy:avl_sdk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:authentium:command_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avast:avast_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avg:avg_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avira:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:rising-global:rising_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:bitdefender:bitdefender", "vulnerable": true }, { "cpe22Uri": "cpe:/a:clamav:clamav", "vulnerable": true }, { "cpe22Uri": "cpe:/a:emsisoft:anti-malware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:eset:nod32_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:f-prot:f-prot_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:gdata-software:g_data_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ikarus:ikarus_virus_utilities_t3_command_line_scanner", "vulnerable": true }, { "cpe22Uri": "cpe:/a:jiangmin:jiangmin_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:k7computing:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:norman:norman_antivirus_%26_antispyware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:pc_tools:pc_tools_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:anti-virus:vba32", "vulnerable": true }, { "cpe22Uri": "cpe:/a:virusbuster:virusbuster", "vulnerable": true }, { "cpe22Uri": "cpe:/a:aladdin:esafe", "vulnerable": true }, { "cpe22Uri": "cpe:/a:kaspersky:kaspersky_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:quick_heal:quick_heal", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:endpoint_protection", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:trend_micro_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:housecall", "vulnerable": true }, { "cpe22Uri": "cpe:/a:microsoft:security_essentials", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:scan_engine", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:web_gateway", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001902" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52610" } ], "trust": 0.3 }, "cve": "CVE-2012-1457", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2012-1457", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54738", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-1457", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-1457", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201203-420", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54738", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54738" }, { "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "db": "CNNVD", "id": "CNNVD-201203-420" }, { "db": "NVD", "id": "CVE-2012-1457" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By a third party TAR Total file size exceeded length With field TAR Malware detection can be bypassed via archive entries. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Vulnerabilities exist in the TAR file parser in version 1004, Trend Micro HouseCall version 9.120.0.1004, VBA32 version 3.12.14.2, and VirusBuster version 13.6.151.0. ============================================================================\nUbuntu Security Notice USN-1482-1\nJune 19, 2012\n\nclamav vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 LTS\n- Ubuntu 11.10\n- Ubuntu 11.04\n- Ubuntu 10.04 LTS\n\nSummary:\n\nClamAV could improperly detect malware if it opened a specially crafted\nfile. \n\nSoftware Description:\n- clamav: Anti-virus utility for Unix\n\nDetails:\n\nIt was discovered that ClamAV incorrectly handled certain malformed TAR\narchives. (CVE-2012-1457,\nCVE-2012-1459)\n\nIt was discovered that ClamAV incorrectly handled certain malformed CHM\nfiles. (CVE-2012-1458)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 LTS:\n clamav 0.97.5+dfsg-1ubuntu0.12.04.1\n clamav-daemon 0.97.5+dfsg-1ubuntu0.12.04.1\n libclamav6 0.97.5+dfsg-1ubuntu0.12.04.1\n\nUbuntu 11.10:\n clamav 0.97.5+dfsg-1ubuntu0.11.10.1\n clamav-daemon 0.97.5+dfsg-1ubuntu0.11.10.1\n libclamav6 0.97.5+dfsg-1ubuntu0.11.10.1\n\nUbuntu 11.04:\n clamav 0.97.5+dfsg-1ubuntu0.11.04.1\n clamav-daemon 0.97.5+dfsg-1ubuntu0.11.04.1\n libclamav6 0.97.5+dfsg-1ubuntu0.11.04.1\n\nUbuntu 10.04 LTS:\n clamav 0.96.5+dfsg-1ubuntu1.10.04.4\n clamav-daemon 0.96.5+dfsg-1ubuntu1.10.04.4\n libclamav6 0.96.5+dfsg-1ubuntu1.10.04.4\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n http://www.ubuntu.com/usn/usn-1482-1\n CVE-2012-1457, CVE-2012-1458, CVE-2012-1459\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.1\n https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.1\n https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.1\n https://launchpad.net/ubuntu/+source/clamav/0.96.5+dfsg-1ubuntu1.10.04.4\n. \n \n The Microsoft CHM file parser in ClamAV 0.96.4 allows remote attackers\n to bypass malware detection via a crafted reset interval in the LZXC\n header of a CHM file. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459\n http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=clamav-0.97.5\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Enterprise Server 5:\n d82d78601290e2f6073974170c81841a mes5/i586/clamav-0.97.5-0.1mdvmes5.2.i586.rpm\n 80f0475472c0217afd3727019bf27e53 mes5/i586/clamav-db-0.97.5-0.1mdvmes5.2.i586.rpm\n c13835eadea8d2af15b628fba3159e8b mes5/i586/clamav-milter-0.97.5-0.1mdvmes5.2.i586.rpm\n d7c058fae32f1a081b1d4ca31157df0e mes5/i586/clamd-0.97.5-0.1mdvmes5.2.i586.rpm\n 5ad153709c7eb510c2be2e82bfa5ac52 mes5/i586/libclamav6-0.97.5-0.1mdvmes5.2.i586.rpm\n 96e3d3f3e9bea802c4109c155c9d1465 mes5/i586/libclamav-devel-0.97.5-0.1mdvmes5.2.i586.rpm \n 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n b30f5aafd9aaff0a7743fb62f33ccbea mes5/x86_64/clamav-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 1508801239427c0ac72734f52cb4451c mes5/x86_64/clamav-db-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 92b4c5ca6db656801b5b6ae217c6e171 mes5/x86_64/clamav-milter-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 94fad12df2cc900309087bbda13c826a mes5/x86_64/clamd-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 8ec166a457d0512479adaaf5f80d487f mes5/x86_64/lib64clamav6-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 19bc2758175bcde28ebf7783d68a9b98 mes5/x86_64/lib64clamav-devel-0.97.5-0.1mdvmes5.2.x86_64.rpm \n 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.11 (GNU/Linux)\n\niD8DBQFP3tnKmqjQ0CJFipgRAj4wAJ9eURS1mZYCZhkmUTVE/U8QAH47MwCgxQzf\nOUr1QL5Wsvt3KboLKCdYUhE=\n=1QL7\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2012-1457" }, { "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "db": "BID", "id": "52610" }, { "db": "VULHUB", "id": "VHN-54738" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" } ], "trust": 2.16 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-54738", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54738" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1457", "trust": 3.0 }, { "db": "BID", "id": "52610", "trust": 1.4 }, { "db": "OSVDB", "id": "80392", "trust": 1.1 }, { "db": "OSVDB", "id": "80406", "trust": 1.1 }, { "db": "OSVDB", "id": "80391", "trust": 1.1 }, { "db": "OSVDB", "id": "80407", "trust": 1.1 }, { "db": "OSVDB", "id": "80396", "trust": 1.1 }, { "db": "OSVDB", "id": "80395", "trust": 1.1 }, { "db": "OSVDB", "id": "80403", "trust": 1.1 }, { "db": "OSVDB", "id": "80409", "trust": 1.1 }, { "db": "OSVDB", "id": "80389", "trust": 1.1 }, { "db": "OSVDB", "id": "80393", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001902", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-420", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19229", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "113841", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-54738", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113878", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54738" }, { "db": "BID", "id": "52610" }, { "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-420" }, { "db": "NVD", "id": "CVE-2012-1457" } ] }, "id": "VAR-201203-0381", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54738" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:46:23.996000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.aladdin.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.antiy.net/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.authentium.com/" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.avast.com/index" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.avg.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.avira.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.bitdefender.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.clamav.net/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.emsisoft.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.eset.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.f-prot.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.gdata-software.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ikarus.at/" }, { "title": "Top Page", "trust": 0.8, "url": "http://global.jiangmin.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.k7computing.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.mcafee.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.microsoft.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.norman.com/" }, { "title": "openSUSE-SU-2012:0833", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.pctools.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.quickheal.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.symantec.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.trendmicro.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://anti-virus.by/en/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.virusbuster.hu/en/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.kaspersky.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001902" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54738" }, { "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "db": "NVD", "id": "CVE-2012-1457" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/52610" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:094" }, { "trust": 1.1, "url": "http://osvdb.org/80389" }, { "trust": 1.1, "url": "http://osvdb.org/80391" }, { "trust": 1.1, "url": "http://osvdb.org/80392" }, { "trust": 1.1, "url": "http://osvdb.org/80393" }, { "trust": 1.1, "url": "http://osvdb.org/80395" }, { "trust": 1.1, "url": "http://osvdb.org/80396" }, { "trust": 1.1, "url": "http://osvdb.org/80403" }, { "trust": 1.1, "url": "http://osvdb.org/80406" }, { "trust": 1.1, "url": "http://osvdb.org/80407" }, { "trust": 1.1, "url": "http://osvdb.org/80409" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74293" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1457" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1457" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19229" }, { "trust": 0.3, "url": "http://www.antiy.net" }, { "trust": 0.3, "url": "http://www.authentium.com" }, { "trust": 0.3, "url": "http://www.avast.com" }, { "trust": 0.3, "url": "http://www.avg.com" }, { "trust": 0.3, "url": "http://www.avira.com/" }, { "trust": 0.3, "url": "http://www.bitdefender.com" }, { "trust": 0.3, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "trust": 0.3, "url": "http://www.safenet-inc.com/data-protection/content-security-esafe/" }, { "trust": 0.3, "url": "http://eset.com" }, { "trust": 0.3, "url": "http://www.f-prot.com/" }, { "trust": 0.3, "url": "http://www.gdatasoftware.com" }, { "trust": 0.3, "url": "http://www.ikarus.at" }, { "trust": 0.3, "url": "http://global.jiangmin.com/" }, { "trust": 0.3, "url": "http://www.k7computing.com/en/product/k7-antivirusplus.php" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.mcafee.com/" }, { "trust": 0.3, "url": "http://www.microsoft.com" }, { "trust": 0.3, "url": "http://anti-virus-software-review.toptenreviews.com/norman-review.html" }, { "trust": 0.3, "url": "http://www.pctools.com/spyware-doctor-antivirus/" }, { "trust": 0.3, "url": "http://www.quickheal.com/" }, { "trust": 0.3, "url": "http://www.rising-global.com/" }, { "trust": 0.3, "url": "http://www.symantec.com" }, { "trust": 0.3, "url": "http://www.trend.com" }, { "trust": 0.3, "url": "http://anti-virus.by/en/index.shtml" }, { "trust": 0.3, "url": "/archive/1/522005" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1457" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1459" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1458" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.96.5+dfsg-1ubuntu1.10.04.4" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1482-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.1" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1459" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=changelog;hb=clamav-0.97.5" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1458" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54738" }, { "db": "BID", "id": "52610" }, { "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-420" }, { "db": "NVD", "id": "CVE-2012-1457" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54738" }, { "db": "BID", "id": "52610" }, { "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-420" }, { "db": "NVD", "id": "CVE-2012-1457" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54738" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52610" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "date": "2012-06-20T02:54:11", "db": "PACKETSTORM", "id": "113878" }, { "date": "2012-06-19T00:56:02", "db": "PACKETSTORM", "id": "113841" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-420" }, { "date": "2012-03-21T10:11:49.287000", "db": "NVD", "id": "CVE-2012-1457" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-18T00:00:00", "db": "VULHUB", "id": "VHN-54738" }, { "date": "2015-05-07T17:17:00", "db": "BID", "id": "52610" }, { "date": "2012-07-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "date": "2012-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-420" }, { "date": "2024-11-21T01:37:01.753000", "db": "NVD", "id": "CVE-2012-1457" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-420" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products TAR Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001902" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-420" } ], "trust": 0.6 } }
var-201203-0144
Vulnerability from variot
The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR Parser If it is announced that there is also a problem with the implementation of CVE May be split.Corresponding to the length field of the full entry and part of the header of the next entry by a third party TAR Malware detection may be bypassed through archive entries. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bit2defender 7. ============================================================================ Ubuntu Security Notice USN-1482-2 June 20, 2012
clamav regression
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 11.04
Summary:
ClamAV could improperly detect malware if it opened a specially crafted file.
Software Description: - clamav: Anti-virus utility for Unix
Details:
USN-1482-1 fixed vulnerabilities in ClamAV. The updated packages could fail to install in certain situations. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that ClamAV incorrectly handled certain malformed TAR archives. (CVE-2012-1457, CVE-2012-1459)
It was discovered that ClamAV incorrectly handled certain malformed CHM files. A remote attacker could create a specially-crafted CHM file containing malware that could escape being detected. (CVE-2012-1458)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 LTS: clamav 0.97.5+dfsg-1ubuntu0.12.04.2 clamav-daemon 0.97.5+dfsg-1ubuntu0.12.04.2 libclamav6 0.97.5+dfsg-1ubuntu0.12.04.2
Ubuntu 11.10: clamav 0.97.5+dfsg-1ubuntu0.11.10.2 clamav-daemon 0.97.5+dfsg-1ubuntu0.11.10.2 libclamav6 0.97.5+dfsg-1ubuntu0.11.10.2
Ubuntu 11.04: clamav 0.97.5+dfsg-1ubuntu0.11.04.2 clamav-daemon 0.97.5+dfsg-1ubuntu0.11.04.2 libclamav6 0.97.5+dfsg-1ubuntu0.11.04.2
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1482-2 http://www.ubuntu.com/usn/usn-1482-1 https://launchpad.net/bugs/1015337
Package Information: https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.2 https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.2 https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.2 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2012:094 http://www.mandriva.com/security/
Package : clamav Date : June 18, 2012 Affected: Enterprise Server 5.0
Problem Description:
This is a bugfix release that upgrades clamav to the latest version (0.97.5) that resolves the following security issues:
The TAR file parser in ClamAV 0.96.4 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459 http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=clamav-0.97.5
Updated Packages:
Mandriva Enterprise Server 5: d82d78601290e2f6073974170c81841a mes5/i586/clamav-0.97.5-0.1mdvmes5.2.i586.rpm 80f0475472c0217afd3727019bf27e53 mes5/i586/clamav-db-0.97.5-0.1mdvmes5.2.i586.rpm c13835eadea8d2af15b628fba3159e8b mes5/i586/clamav-milter-0.97.5-0.1mdvmes5.2.i586.rpm d7c058fae32f1a081b1d4ca31157df0e mes5/i586/clamd-0.97.5-0.1mdvmes5.2.i586.rpm 5ad153709c7eb510c2be2e82bfa5ac52 mes5/i586/libclamav6-0.97.5-0.1mdvmes5.2.i586.rpm 96e3d3f3e9bea802c4109c155c9d1465 mes5/i586/libclamav-devel-0.97.5-0.1mdvmes5.2.i586.rpm 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64: b30f5aafd9aaff0a7743fb62f33ccbea mes5/x86_64/clamav-0.97.5-0.1mdvmes5.2.x86_64.rpm 1508801239427c0ac72734f52cb4451c mes5/x86_64/clamav-db-0.97.5-0.1mdvmes5.2.x86_64.rpm 92b4c5ca6db656801b5b6ae217c6e171 mes5/x86_64/clamav-milter-0.97.5-0.1mdvmes5.2.x86_64.rpm 94fad12df2cc900309087bbda13c826a mes5/x86_64/clamd-0.97.5-0.1mdvmes5.2.x86_64.rpm 8ec166a457d0512479adaaf5f80d487f mes5/x86_64/lib64clamav6-0.97.5-0.1mdvmes5.2.x86_64.rpm 19bc2758175bcde28ebf7783d68a9b98 mes5/x86_64/lib64clamav-devel-0.97.5-0.1mdvmes5.2.x86_64.rpm 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFP3tnKmqjQ0CJFipgRAj4wAJ9eURS1mZYCZhkmUTVE/U8QAH47MwCgxQzf OUr1QL5Wsvt3KboLKCdYUhE= =1QL7 -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0144", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "virusbuster", "scope": "eq", "trust": 2.4, "vendor": "virusbuster", "version": "13.6.151.0" }, { "model": "antivirus", "scope": "eq", "trust": 2.1, "vendor": "comodo", "version": "7424" }, { "model": "avl sdk", "scope": "eq", "trust": 1.8, "vendor": "antiy", "version": "2.0.3.7" }, { "model": "command antivirus", "scope": "eq", "trust": 1.8, "vendor": "authentium", "version": "5.2.11.5" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "avg", "version": "10.0.0.1190" }, { "model": "bitdefender", "scope": "eq", "trust": 1.8, "vendor": "bitdefender", "version": "7.2" }, { "model": "clamav", "scope": "eq", "trust": 1.8, "vendor": "clamav", "version": "0.96.4" }, { "model": "anti-malware", "scope": "eq", "trust": 1.8, "vendor": "emsisoft", "version": "5.1.0.1" }, { "model": "virus utilities t3 command line scanner", "scope": "eq", "trust": 1.8, "vendor": "ikarus", "version": "1.1.97.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "pc tools", "version": "7.0.3.5" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.8, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "sophos", "version": "4.61.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "scan engine", "scope": "eq", "trust": 1.8, "vendor": "mcafee", "version": "5.400.0.1158" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "5.0.677.0" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "4.8.1351.0" }, { "model": "v3 internet security", "scope": "eq", "trust": 1.0, "vendor": "ahnlab", "version": "2011.01.18.00" }, { "model": "trend micro antivirus", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "g data antivirus", "scope": "eq", "trust": 1.0, "vendor": "gdata", "version": "21" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "security essentials", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "2.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "k7computing", "version": "9.77.3565" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "5795" }, { "model": "vba32", "scope": "eq", "trust": 1.0, "vendor": "anti virus", "version": "3.12.14.2" }, { "model": "endpoint protection", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "11.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "panda antivirus", "scope": "eq", "trust": 1.0, "vendor": "pandasecurity", "version": "10.0.2.7" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "antivirus \\\u0026 antispyware", "scope": "eq", "trust": 1.0, "vendor": "norman", "version": "6.06.12" }, { "model": "housecall", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "quick heal", "scope": "eq", "trust": 1.0, "vendor": "cat", "version": "11.00" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 1.0, "vendor": "f prot", "version": "4.6.2.117" }, { "model": "antivir", "scope": "eq", "trust": 1.0, "vendor": "avira", "version": "7.11.1.163" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "4.8.1351.0" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "5.0.677.0" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "avira", "version": "7.11.1.163" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "nod32 anti-virus", "scope": "eq", "trust": 0.8, "vendor": "eset", "version": "5795" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 0.8, "vendor": "frisk", "version": "4.6.2.117" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "g data", "version": "21" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "k7 computing", "version": "9.77.3565" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "panda security", "version": "10.0.2.7" }, { "model": "vba32", "scope": "eq", "trust": 0.8, "vendor": "virusblokada", "version": "3.12.14.2" }, { "model": "v3 internet security", "scope": "eq", "trust": 0.8, "vendor": "unlab", "version": "2011.01.18.00" }, { "model": "heal", "scope": "eq", "trust": 0.8, "vendor": "quick heal k k", "version": "11.00" }, { "model": "endpoint protection", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "11" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "housecall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "security essentials", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "2.0 antimalware engine 1.1.6402.0" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "vba32", "scope": "eq", "trust": 0.3, "vendor": "virusblokada", "version": "3.12.142" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "virusbuster", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "13.6.1510" }, { "model": "trend micro", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "housecall", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20101.3103" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "12.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.4" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "cat-quickheal", "scope": "eq", "trust": 0.3, "vendor": "quick heal", "version": "11.00" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "pctools", "version": "7.0.35" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "norman", "version": "6.6.12" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1.6402" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "7.0125" }, { "model": "computing pvt ltd k7antivirus", "scope": "eq", "trust": 0.3, "vendor": "k7", "version": "9.77.3565" }, { "model": "jiangmin", "scope": "eq", "trust": 0.3, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus t3.1.1.97.0", "scope": null, "trust": 0.3, "vendor": "ikarus", "version": null }, { "model": "data software gdata", "scope": "eq", "trust": 0.3, "vendor": "g", "version": "21" }, { "model": "software f-prot antivirus", "scope": "eq", "trust": 0.3, "vendor": "frisk", "version": "4.6.2117" }, { "model": "nod32", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11" }, { "model": "anti-virus clamav", "scope": "eq", "trust": 0.3, "vendor": "clam", "version": "0.96.4" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "bitdefender", "version": "7.2" }, { "model": "antivir engine", "scope": "eq", "trust": 0.3, "vendor": "avira", "version": "7.11.1163" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "avg", "version": "10.01190" }, { "model": "avast5 antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "5.0.6770" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.8.1351.0" }, { "model": "command antivirus", "scope": "eq", "trust": 0.3, "vendor": "authentium", "version": "5.2.115" }, { "model": "antiy-avl", "scope": "eq", "trust": 0.3, "vendor": "antiy", "version": "2.0.37" }, { "model": "engine", "scope": "eq", "trust": 0.3, "vendor": "ahnlab", "version": "v32011.01.18.00" } ], "sources": [ { "db": "BID", "id": "52623" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "CNNVD", "id": "CNNVD-201203-422" }, { "db": "NVD", "id": "CVE-2012-1459" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:antiy:avl_sdk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:authentium:command_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avast:avast_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avg:avg_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avira:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:rising-global:rising_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:bitdefender:bitdefender", "vulnerable": true }, { "cpe22Uri": "cpe:/a:clamav:clamav", "vulnerable": true }, { "cpe22Uri": "cpe:/a:comodo:comodo_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:emsisoft:anti-malware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:eset:nod32_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:f-prot:f-prot_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:gdata-software:g_data_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ikarus:ikarus_virus_utilities_t3_command_line_scanner", "vulnerable": true }, { "cpe22Uri": "cpe:/a:jiangmin:jiangmin_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:k7computing:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:norman:norman_antivirus_%26_antispyware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nprotect:nprotect_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:pandasecurity:panda_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:pc_tools:pc_tools_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:anti-virus:vba32", "vulnerable": true }, { "cpe22Uri": "cpe:/a:virusbuster:virusbuster", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ahnlab:v3_internet_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:f-secure:anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:kaspersky:kaspersky_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:quick_heal:quick_heal", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:endpoint_protection", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sophos:anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:trend_micro_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:housecall", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fortinet:fortinet_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:microsoft:security_essentials", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:scan_engine", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:web_gateway", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001869" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52623" } ], "trust": 0.3 }, "cve": "CVE-2012-1459", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2012-1459", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54740", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-1459", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-1459", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201203-422", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54740", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54740" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "CNNVD", "id": "CNNVD-201203-422" }, { "db": "NVD", "id": "CVE-2012-1459" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR Parser If it is announced that there is also a problem with the implementation of CVE May be split.Corresponding to the length field of the full entry and part of the header of the next entry by a third party TAR Malware detection may be bypassed through archive entries. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bit2defender 7. ============================================================================\nUbuntu Security Notice USN-1482-2\nJune 20, 2012\n\nclamav regression\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 LTS\n- Ubuntu 11.10\n- Ubuntu 11.04\n\nSummary:\n\nClamAV could improperly detect malware if it opened a specially crafted file. \n\nSoftware Description:\n- clamav: Anti-virus utility for Unix\n\nDetails:\n\nUSN-1482-1 fixed vulnerabilities in ClamAV. The updated packages could fail\nto install in certain situations. This update fixes the problem. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\n It was discovered that ClamAV incorrectly handled certain malformed TAR\n archives. (CVE-2012-1457,\n CVE-2012-1459)\n \n It was discovered that ClamAV incorrectly handled certain malformed CHM\n files. A remote attacker could create a specially-crafted CHM file\n containing malware that could escape being detected. (CVE-2012-1458)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 LTS:\n clamav 0.97.5+dfsg-1ubuntu0.12.04.2\n clamav-daemon 0.97.5+dfsg-1ubuntu0.12.04.2\n libclamav6 0.97.5+dfsg-1ubuntu0.12.04.2\n\nUbuntu 11.10:\n clamav 0.97.5+dfsg-1ubuntu0.11.10.2\n clamav-daemon 0.97.5+dfsg-1ubuntu0.11.10.2\n libclamav6 0.97.5+dfsg-1ubuntu0.11.10.2\n\nUbuntu 11.04:\n clamav 0.97.5+dfsg-1ubuntu0.11.04.2\n clamav-daemon 0.97.5+dfsg-1ubuntu0.11.04.2\n libclamav6 0.97.5+dfsg-1ubuntu0.11.04.2\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n http://www.ubuntu.com/usn/usn-1482-2\n http://www.ubuntu.com/usn/usn-1482-1\n https://launchpad.net/bugs/1015337\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.2\n https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.2\n https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.2\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n\n Mandriva Linux Security Advisory MDVSA-2012:094\n http://www.mandriva.com/security/\n _______________________________________________________________________\n\n Package : clamav\n Date : June 18, 2012\n Affected: Enterprise Server 5.0\n _______________________________________________________________________\n\n Problem Description:\n\n This is a bugfix release that upgrades clamav to the latest version\n (0.97.5) that resolves the following security issues:\n \n The TAR file parser in ClamAV 0.96.4 allows remote attackers to bypass\n malware detection via a TAR archive entry with a length field that\n exceeds the total TAR file size. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459\n http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=clamav-0.97.5\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Enterprise Server 5:\n d82d78601290e2f6073974170c81841a mes5/i586/clamav-0.97.5-0.1mdvmes5.2.i586.rpm\n 80f0475472c0217afd3727019bf27e53 mes5/i586/clamav-db-0.97.5-0.1mdvmes5.2.i586.rpm\n c13835eadea8d2af15b628fba3159e8b mes5/i586/clamav-milter-0.97.5-0.1mdvmes5.2.i586.rpm\n d7c058fae32f1a081b1d4ca31157df0e mes5/i586/clamd-0.97.5-0.1mdvmes5.2.i586.rpm\n 5ad153709c7eb510c2be2e82bfa5ac52 mes5/i586/libclamav6-0.97.5-0.1mdvmes5.2.i586.rpm\n 96e3d3f3e9bea802c4109c155c9d1465 mes5/i586/libclamav-devel-0.97.5-0.1mdvmes5.2.i586.rpm \n 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n b30f5aafd9aaff0a7743fb62f33ccbea mes5/x86_64/clamav-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 1508801239427c0ac72734f52cb4451c mes5/x86_64/clamav-db-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 92b4c5ca6db656801b5b6ae217c6e171 mes5/x86_64/clamav-milter-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 94fad12df2cc900309087bbda13c826a mes5/x86_64/clamd-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 8ec166a457d0512479adaaf5f80d487f mes5/x86_64/lib64clamav6-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 19bc2758175bcde28ebf7783d68a9b98 mes5/x86_64/lib64clamav-devel-0.97.5-0.1mdvmes5.2.x86_64.rpm \n 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.11 (GNU/Linux)\n\niD8DBQFP3tnKmqjQ0CJFipgRAj4wAJ9eURS1mZYCZhkmUTVE/U8QAH47MwCgxQzf\nOUr1QL5Wsvt3KboLKCdYUhE=\n=1QL7\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2012-1459" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "BID", "id": "52623" }, { "db": "VULHUB", "id": "VHN-54740" }, { "db": "PACKETSTORM", "id": "115619" }, { "db": "PACKETSTORM", "id": "113895" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" } ], "trust": 2.34 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-54740", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54740" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1459", "trust": 3.2 }, { "db": "BID", "id": "52623", "trust": 1.4 }, { "db": "OSVDB", "id": "80396", "trust": 1.1 }, { "db": "OSVDB", "id": "80389", "trust": 1.1 }, { "db": "OSVDB", "id": "80391", "trust": 1.1 }, { "db": "OSVDB", "id": "80403", "trust": 1.1 }, { "db": "OSVDB", "id": "80395", "trust": 1.1 }, { "db": "OSVDB", "id": "80390", "trust": 1.1 }, { "db": "OSVDB", "id": "80392", "trust": 1.1 }, { "db": "OSVDB", "id": "80393", "trust": 1.1 }, { "db": "OSVDB", "id": "80409", "trust": 1.1 }, { "db": "OSVDB", "id": "80406", "trust": 1.1 }, { "db": "OSVDB", "id": "80407", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001869", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19231", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201203-422", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "113878", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "115619", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "113895", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-54740", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113841", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54740" }, { "db": "BID", "id": "52623" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "PACKETSTORM", "id": "115619" }, { "db": "PACKETSTORM", "id": "113895" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-422" }, { "db": "NVD", "id": "CVE-2012-1459" } ] }, "id": "VAR-201203-0144", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54740" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:46:27.813000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AVL SDK", "trust": 0.8, "url": "http://www.antiy.net/" }, { "title": "Command Antivirus", "trust": 0.8, "url": "http://www.authentium.com/command/CSAVDownload.html" }, { "title": "avast! Antivirus", "trust": 0.8, "url": "https://www.avast.co.jp/index" }, { "title": "AVG Anti-Virus", "trust": 0.8, "url": "http://www.avgjapan.com/home-small-office-security/buy-antivirus" }, { "title": "AntiVir", "trust": 0.8, "url": "http://www.avira.com/" }, { "title": "Rising Antivirus", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Bitdefender", "trust": 0.8, "url": "http://www.bitdefender.com/" }, { "title": "ClamAV", "trust": 0.8, "url": "http://www.clamav.net/lang/en/" }, { "title": "Comodo Antivirus", "trust": 0.8, "url": "http://www.comodo.com/home/internet-security/antivirus.php" }, { "title": "Emsisoft Anti-Malware", "trust": 0.8, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "title": "ESET NOD32\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9", "trust": 0.8, "url": "http://www.eset.com/us/" }, { "title": "Fortinet Antivirus", "trust": 0.8, "url": "http://www.fortinet.com/solutions/antivirus.html" }, { "title": "F-Prot Antivirus", "trust": 0.8, "url": "http://www.f-prot.com/index.html" }, { "title": "G Data AntiVirus", "trust": 0.8, "url": "http://www.gdata.co.jp/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ikarus.at/en/" }, { "title": "Jiangmin Antivirus", "trust": 0.8, "url": "http://global.jiangmin.com/" }, { "title": "K7 AntiVirus", "trust": 0.8, "url": "http://www.k7computing.com/en/consumer_home.php" }, { "title": "McAfee Web Gateway", "trust": 0.8, "url": "http://www.mcafee.com/us/products/web-gateway.aspx" }, { "title": "McAfee Scan Engine", "trust": 0.8, "url": "http://www.mcafee.com/us/support/support-eol-scan-engine.aspx" }, { "title": "Norman Antivirus", "trust": 0.8, "url": "http://www.norman.com/products/antivirus_antispyware/en" }, { "title": "nProtect Anti-Virus", "trust": 0.8, "url": "http://global.nprotect.com/product/avs.php" }, { "title": "openSUSE-SU-2012:0833", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" }, { "title": "Panda Antivirus", "trust": 0.8, "url": "http://www.ps-japan.co.jp/" }, { "title": "PC Tools AntiVirus", "trust": 0.8, "url": "http://www.pctools.com/jp/spyware-doctor-antivirus/" }, { "title": "Quick Heal", "trust": 0.8, "url": "http://www.quickheal.com/" }, { "title": "Sophos Anti-Virus", "trust": 0.8, "url": "http://www.sophos.com/ja-jp/" }, { "title": "Endpoint Protection", "trust": 0.8, "url": "http://www.symantec.com/ja/jp/endpoint-protection" }, { "title": "Top Page", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/home/index.html" }, { "title": "Trend Micro HouseCall", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/tools/housecall/index.html" }, { "title": "VBA32", "trust": 0.8, "url": "http://anti-virus.by/en/index.shtml" }, { "title": "VirusBuster", "trust": 0.8, "url": "http://www.virusbuster.hu/en" }, { "title": "V3 Internet Security", "trust": 0.8, "url": "http://www.ahnlab.co.jp/product_service/product/b2b/v3is8.asp" }, { "title": "Kaspersky Anti-Virus", "trust": 0.8, "url": "http://www.kaspersky.com/kaspersky_anti-virus" }, { "title": "Microsoft Security Essentials", "trust": 0.8, "url": "http://windows.microsoft.com/ja-JP/windows/products/security-essentials" }, { "title": "F-Secure Anti-Virus", "trust": 0.8, "url": "http://www.f-secure.com/ja/web/home_jp/protection/anti-virus/overview" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001869" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54740" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "NVD", "id": "CVE-2012-1459" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/52623" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:094" }, { "trust": 1.1, "url": "http://osvdb.org/80389" }, { "trust": 1.1, "url": "http://osvdb.org/80390" }, { "trust": 1.1, "url": "http://osvdb.org/80391" }, { "trust": 1.1, "url": "http://osvdb.org/80392" }, { "trust": 1.1, "url": "http://osvdb.org/80393" }, { "trust": 1.1, "url": "http://osvdb.org/80395" }, { "trust": 1.1, "url": "http://osvdb.org/80396" }, { "trust": 1.1, "url": "http://osvdb.org/80403" }, { "trust": 1.1, "url": "http://osvdb.org/80406" }, { "trust": 1.1, "url": "http://osvdb.org/80407" }, { "trust": 1.1, "url": "http://osvdb.org/80409" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74302" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1459" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1459" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19231" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1459" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1458" }, { "trust": 0.3, "url": "http://www.antiy.net" }, { "trust": 0.3, "url": "http://www.authentium.com" }, { "trust": 0.3, "url": "http://www.avast.com" }, { "trust": 0.3, "url": "http://www.avg.com" }, { "trust": 0.3, "url": "http://www.avira.com/" }, { "trust": 0.3, "url": "http://www.bitdefender.com" }, { "trust": 0.3, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "trust": 0.3, "url": "http://eset.com" }, { "trust": 0.3, "url": "http://www.f-prot.com/" }, { "trust": 0.3, "url": "http://www.gdatasoftware.com" }, { "trust": 0.3, "url": "http://www.ikarus.at" }, { "trust": 0.3, "url": "http://global.jiangmin.com/" }, { "trust": 0.3, "url": "http://www.k7computing.com/en/product/k7-antivirusplus.php" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.mcafee.com/" }, { "trust": 0.3, "url": "http://www.microsoft.com" }, { "trust": 0.3, "url": "http://anti-virus-software-review.toptenreviews.com/norman-review.html" }, { "trust": 0.3, "url": "http://www.pctools.com/spyware-doctor-antivirus/" }, { "trust": 0.3, "url": "http://www.quickheal.com/" }, { "trust": 0.3, "url": "http://www.rising-global.com/" }, { "trust": 0.3, "url": "http://www.symantec.com" }, { "trust": 0.3, "url": "http://www.trend.com" }, { "trust": 0.3, "url": "http://anti-virus.by/en/index.shtml" }, { "trust": 0.3, "url": "/archive/1/522005" }, { "trust": 0.3, "url": "http://www.ubuntu.com/usn/usn-1482-1" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1457" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.3" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1482-3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.3" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1015405" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.2" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1015337" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.2" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1482-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.96.5+dfsg-1ubuntu1.10.04.4" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.1" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=changelog;hb=clamav-0.97.5" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1457" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1458" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54740" }, { "db": "BID", "id": "52623" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "PACKETSTORM", "id": "115619" }, { "db": "PACKETSTORM", "id": "113895" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-422" }, { "db": "NVD", "id": "CVE-2012-1459" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54740" }, { "db": "BID", "id": "52623" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "PACKETSTORM", "id": "115619" }, { "db": "PACKETSTORM", "id": "113895" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-422" }, { "db": "NVD", "id": "CVE-2012-1459" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54740" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52623" }, { "date": "2012-03-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "date": "2012-08-17T02:36:21", "db": "PACKETSTORM", "id": "115619" }, { "date": "2012-06-20T03:33:06", "db": "PACKETSTORM", "id": "113895" }, { "date": "2012-06-20T02:54:11", "db": "PACKETSTORM", "id": "113878" }, { "date": "2012-06-19T00:56:02", "db": "PACKETSTORM", "id": "113841" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-422" }, { "date": "2012-03-21T10:11:49.597000", "db": "NVD", "id": "CVE-2012-1459" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-18T00:00:00", "db": "VULHUB", "id": "VHN-54740" }, { "date": "2015-04-13T22:00:00", "db": "BID", "id": "52623" }, { "date": "2012-07-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "date": "2012-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-422" }, { "date": "2024-11-21T01:37:02.073000", "db": "NVD", "id": "CVE-2012-1459" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "115619" }, { "db": "PACKETSTORM", "id": "113895" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-422" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products TAR Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001869" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-422" } ], "trust": 0.6 } }
var-201203-0385
Vulnerability from variot
The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Emsisoft Anti-Malware 5.1.0.1, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \50\4B\03\04 character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By a third party \50\4B\03\04 Has a character sequence starting with POSIX TAR Malware detection may be avoided via files. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. The following products are affected: AVIRA AntiVir Engine 7.11.1.163 Antiy Antiy-AVL 2.0.3.7 Quick Heal Technologies CAT-QuickHeal 11.00 Emsisoft Antivirus 5.1.0.1 Ikarus Antivirus T3.1.1.97.0 Jiangmin 13.0.900 Kaspersky Antivirus 7.0.0.125 McAfee 5.400.0.1158 McAfee-GW-Edition 2010.1C NOD32 5795 Norman Antivirus 6.06.12 PCTools Antivirus 7.0.3.5 Symantec AntiVirus 20101.3.0.103 TrendMicro 9.120.0.1004 TrendMicro-HouseCall 9.120.0.1004. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All affected products are command-line versions of the AVs.
Vulnerability Descriptions
- Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes evades detection.
Affected products - ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no - CVE-2012-1419
- Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, Rising 22.83.00.03
CVE no - CVE-2012-1420
- Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, Symantec 20101.3.0.103
CVE no - CVE-2012-1421
- Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1422
- Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes evades detection.
Affected products - Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no - CVE-2012-1423
- Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8 evades detection.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, PCTools 7.0.3.5, Sophos 4.61.0
CVE no - CVE-2012-1424
- Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first 4 bytes evades detection. Specially crafted infected POSIX TAR files with "\42\5A\68" as the first 3 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1426
- Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1427
- Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1428
- Specially crafted infected ELF files with "ustar" at offset 257 evades detection.
Affected products - BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no - CVE-2012-1429 12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades detection.
Affected products - BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no - CVE-2012-1430 13. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no - CVE-2012-1431
- Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1432
- Specially crafted infected MS EXE files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1433
- Specially crafted infected MS EXE files with "\19\04\00\10" at offset 8 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1434
- Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at offset 30 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1435
- Specially crafted infected MS EXE files with "\2D\6C\68" at offset 2 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1436
- Specially crafted infected MS Office files with "\50\4B\53\70\58" at offset 526 evades detection.
Affected products - Comodo 7425
CVE no - CVE-2012-1437
- Specially crafted infected MS Office files with "ustar" at offset 257 evades detection.
Affected products - Comodo 7425, Sophos 4.61.0
CVE no - CVE-2012-1438
- 'padding' field in ELF files is parsed incorrectly. If an infected ELF file's padding field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1439
- 'identsize' field in ELF files is parsed incorrectly. If an infected ELF file's identsize field is incremented by 1 it evades detection.
Affected products - Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1440
- 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1 it evades detection.
Affected products - Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0
CVE no - CVE-2012-1441
- 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0, Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1442
- Infected RAR files with initial two bytes set to 'MZ' can be fixed by the user and correctly extracted. Such a file evades detection.
Affected products - ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0 nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no - CVE-2012-1443
- 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1444
- 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1445
- 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades detection. 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades detection.
Affected products - Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no - CVE-2012-1447
- 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0 TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no - CVE-2012-1448
- 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1449
- 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1450
- 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1451
- 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no - CVE-2012-1452
- 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades detection.
Affected products - McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125, Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C, Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402, Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1453
- 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades detection.
Affected products - McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1454
- 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1455
- A specially crafted ZIP file, created by concatenating the contents of a clean TAR archive and a virus-infected ZIP archive, is parsed incorrectly and evades detection.
Affected products - AVG 10.0.0.1190, CAT-QuickHeal 11.00, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117,Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no - CVE-2012-1456
- If the length field in the header of a file with test EICAR virus included into a TAR archive is set to be greater than the archive's total length (1,000,000+original length in our experiments), the antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program.
Affected products - AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no - CVE-2012-1457
- A Windows Compiled HTML Help (CHM) file is a set of HTML files, scripts, and images compressed using the LZX algorithm. For faster random accesses, the algorithm is reset at intervals instead of compressing the entire file as a single stream. The length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval is lower than in the original file, the antivirus declares the file to be clean. But the Windows CHM viewer hh.exe correctly decompresses the infected content located before the tampered header.
Affected products - ClamAV 0.96.4, Sophos 4.61.0
CVE no - CVE-2012-1458
- In a POSIX TAR archive, each member file has a 512-byte header protected by a simple checksum. Every header also contains a file length field, which is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while the second is infected with test EICAR virus - and it is modified such that the length field in the header of the first, clean file to point into the middle of the header of the second, infected file. The antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program.
Affected products - AhnLab-V3 2011.01.18.00, AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Comodo 7424, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, Fortinent 4.2.254.0, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7, PCTools 7.0.3.5, Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no - CVE-2012-1459
- If an infected tar.gz archive is appended 6 random bytes at the end, the antivirus declares the file to be clean but virus gets extracted by the gunzip+tar programs correctly by ignoring these bytes.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no - CVE-2012-1460
- GZIP files can contain multiple compressed streams, which are assembled when the contents are extracted. If an infected .tar.gz file is broken into two streams, the antivirus declares the infected .tar.gz file to be clean while tar+gunzip extract the virus correctly
Affected products - AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no - CVE-2012-1461
- If an infected ZIP archive is prepended with 1024 random bytes at the beginning, the antivirus declares the file to be clean but virus gets extracted by the unzip program correctly by skipping these bytes
Affected products - AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, Symantec 20101.3.0.103
CVE no - CVE-2012-1462
- In most ELF files, the 5th byte of the header indicates endianness: 01 for little-endian, 02 for bigendian. Linux kernel, however, does not check this field before loading an ELF file. If an infected ELF file's 5-th byte is set to 02, the antivirus declares the file to be clean but the ELF file gets executed correctly.
Affected products - AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no - CVE-2012-1463
Credits
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
References
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov To appear in IEEE Symposium on Security and Privacy 2012 http://www.ieee-security.org/TC/SP2012/
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0385", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "antivirus", "scope": "eq", "trust": 2.4, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "avl sdk", "scope": "eq", "trust": 1.8, "vendor": "antiy", "version": "2.0.3.7" }, { "model": "anti-malware", "scope": "eq", "trust": 1.8, "vendor": "emsisoft", "version": "5.1.0.1" }, { "model": "virus utilities t3 command line scanner", "scope": "eq", "trust": 1.8, "vendor": "ikarus", "version": "1.1.97.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "pc tools", "version": "7.0.3.5" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "scan engine", "scope": "eq", "trust": 1.8, "vendor": "mcafee", "version": "5.400.0.1158" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "antivirus \\\u0026 antispyware", "scope": "eq", "trust": 1.0, "vendor": "norman", "version": "6.06.12" }, { "model": "trend micro antivirus", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "quick heal", "scope": "eq", "trust": 1.0, "vendor": "cat", "version": "11.00" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "5795" }, { "model": "endpoint protection", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "11.0" }, { "model": "housecall", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "antivir", "scope": "eq", "trust": 1.0, "vendor": "avira", "version": "7.11.1.163" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "avira", "version": "7.11.1.163" }, { "model": "nod32 anti-virus", "scope": "eq", "trust": 0.8, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "heal", "scope": "eq", "trust": 0.8, "vendor": "quick heal k k", "version": "11.00" }, { "model": "endpoint protection", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "11 avengine 20101.3.0.103" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "housecall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "trend micro", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "housecall", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20101.3103" }, { "model": "cat-quickheal", "scope": "eq", "trust": 0.3, "vendor": "quick heal", "version": "11.00" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "pctools", "version": "7.0.35" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "norman", "version": "6.6.12" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "7.0125" }, { "model": "jiangmin", "scope": "eq", "trust": 0.3, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus t3.1.1.97.0", "scope": null, "trust": 0.3, "vendor": "ikarus", "version": null }, { "model": "nod32", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11" }, { "model": "antivir engine", "scope": "eq", "trust": 0.3, "vendor": "avira", "version": "7.11.1163" }, { "model": "antiy-avl", "scope": "eq", "trust": 0.3, "vendor": "antiy", "version": "2.0.37" } ], "sources": [ { "db": "BID", "id": "52580" }, { "db": "JVNDB", "id": "JVNDB-2012-001887" }, { "db": "CNNVD", "id": "CNNVD-201203-391" }, { "db": "NVD", "id": "CVE-2012-1425" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:antiy:avl_sdk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avira:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:emsisoft:anti-malware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:eset:nod32_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ikarus:ikarus_virus_utilities_t3_command_line_scanner", "vulnerable": true }, { "cpe22Uri": "cpe:/a:jiangmin:jiangmin_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:norman:norman_antivirus_%26_antispyware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:pc_tools:pc_tools_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:kaspersky:kaspersky_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:quick_heal:quick_heal", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:endpoint_protection", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:trend_micro_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:housecall", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fortinet:fortinet_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:scan_engine", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:web_gateway", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001887" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52580" } ], "trust": 0.3 }, "cve": "CVE-2012-1425", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2012-1425", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54706", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-1425", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-1425", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201203-391", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54706", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54706" }, { "db": "JVNDB", "id": "JVNDB-2012-001887" }, { "db": "CNNVD", "id": "CNNVD-201203-391" }, { "db": "NVD", "id": "CVE-2012-1425" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Emsisoft Anti-Malware 5.1.0.1, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \\50\\4B\\03\\04 character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By a third party \\50\\4B\\03\\04 Has a character sequence starting with POSIX TAR Malware detection may be avoided via files. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. \nThe following products are affected:\nAVIRA AntiVir Engine 7.11.1.163\nAntiy Antiy-AVL 2.0.3.7\nQuick Heal Technologies CAT-QuickHeal 11.00\nEmsisoft Antivirus 5.1.0.1\nIkarus Antivirus T3.1.1.97.0\nJiangmin 13.0.900\nKaspersky Antivirus 7.0.0.125\nMcAfee 5.400.0.1158\nMcAfee-GW-Edition 2010.1C\nNOD32 5795\nNorman Antivirus 6.06.12\nPCTools Antivirus 7.0.3.5\nSymantec AntiVirus 20101.3.0.103\nTrendMicro 9.120.0.1004\nTrendMicro-HouseCall 9.120.0.1004. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All \naffected products are command-line versions of \nthe AVs. \n\n----------------------------\nVulnerability Descriptions\n----------------------------\n\n1. Specially crafted infected POSIX TAR files with \"[aliases]\" as first 9 bytes \n evades detection. \n\n Affected products -\n ClamAV 0.96.4, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1419\n\n2. Specially crafted infected POSIX TAR files with \"\\7fELF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, \n Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1420\n\n3. Specially crafted infected POSIX TAR files with \"MSCF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, \n Symantec 20101.3.0.103\n\n CVE no - \n CVE-2012-1421\n\n4. Specially crafted infected POSIX TAR files with \"ITSF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1422\n\n5. Specially crafted infected POSIX TAR files with \"MZ\" as first 2 bytes \n evades detection. \n\n Affected products -\n Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, \n Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, \n PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0\n\n CVE no - \n CVE-2012-1423\n\n6. Specially crafted infected POSIX TAR files with \"\\19\\04\\00\\10\" at offset 8\n evades detection. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, \n PCTools 7.0.3.5, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1424\n\n\n7. Specially crafted infected POSIX TAR files with \"\\50\\4B\\03\\04\" as the first\n 4 bytes evades detection. Specially crafted infected POSIX TAR files with \"\\42\\5A\\68\" as the first\n 3 bytes evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1426\n\n\n9. Specially crafted infected POSIX TAR files with \"\\57\\69\\6E\\5A\\69\\70\" at \n offset 29 evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1427\n\n10. Specially crafted infected POSIX TAR files with \"\\4a\\46\\49\\46\" at offset 6\n evades detection. \n \n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1428\n\n11. Specially crafted infected ELF files with \"ustar\" at offset 257\n evades detection. \n\n Affected products -\n BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, \n McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01 \n\n CVE no - \n CVE-2012-1429\n12. Specially crafted infected ELF files with \"\\19\\04\\00\\10\" at offset 8 evades\n detection. \n\n Affected products -\n BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, \n Sophos 4.61.0, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1430\n13. Specially crafted infected ELF files with \"\\4a\\46\\49\\46\" at offset 6 evades\n detection. \n\n Affected products -\n BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, \n F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, \n nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1431\n\n14. Specially crafted infected MS EXE files with \"\\57\\69\\6E\\5A\\69\\70\" at offset\n 29 evades detection. \n\n Affected products -\n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1432\n\n15. Specially crafted infected MS EXE files with \"\\4a\\46\\49\\46\" at offset\n 6 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1433\n\n16. Specially crafted infected MS EXE files with \"\\19\\04\\00\\10\" at offset\n 8 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, \n Panda 10.0.2.7\n \n CVE no - \n CVE-2012-1434\n\n17. Specially crafted infected MS EXE files with \"\\50\\4B\\4C\\49\\54\\45\" at \n offset 30 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1435\n\n18. Specially crafted infected MS EXE files with \"\\2D\\6C\\68\" at \n offset 2 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1436\n\n19. Specially crafted infected MS Office files with \"\\50\\4B\\53\\70\\58\" at \n offset 526 evades detection. \n \n Affected products - \n Comodo 7425\n \n CVE no - \n CVE-2012-1437\n\n20. Specially crafted infected MS Office files with \"ustar\" at \n offset 257 evades detection. \n\n Affected products - \n Comodo 7425, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1438\n\n21. \u0027padding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s padding field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1439\n\n22. \u0027identsize\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s identsize field is incremented by 1 it evades\n detection. \n\n Affected products - \n Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1440\n\n23. \u0027e_ip\u0027 and \u0027e_res\u0027 field in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n Prevx 3.0\n\n \u0027e_minalloc\u0027, \u0027e_res2\u0027,\u0027e_cparhdr\u0027, \u0027e_crlc\u0027, \u0027e_lfarlc\u0027,\u0027e_maxalloc\u0027,\n \u0027e_oeminfo\u0027, \u0027e_ovno\u0027, \u0027e_cs\u0027, \u0027e_csum\u0027,\u0027e_sp\u0027, \u0027e_ss\u0027, \u0027e_cblp\u0027 and \n \u0027e_oemid\u0027 fields in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0\n\n\n CVE no - \n CVE-2012-1441\n\n24. \u0027class\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s class field is incremented by 1 it evades\n detection. \n\n Affected products - \n CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0, \n Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1442\n\n25. Infected RAR files with initial two bytes set to \u0027MZ\u0027 can be fixed by the \n user and correctly extracted. Such a file evades detection. \n \n Affected products -\n ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, \n Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, \n Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, \n VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, \n K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 \n Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, \n Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, \n TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0\n nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, \n Avast5 5.0.677.0, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1443\n\n26. \u0027abiversion\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abiversion field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1444\n\n27. \u0027abi\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abi field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1445\n\n28. \u0027encoding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s encoding field is incremented by 1 it evades\n detection. \u0027e_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s e_version field is incremented by 1 it evades\n detection. \n\n Affected products -\n Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1447\n\n30. \u0027cbCabinet\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s cbCabinet field is incremented by 1 it evades\n detection. \n\n Affected products -\n CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0\n TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1 \n\n CVE no - \n CVE-2012-1448\n\n31. \u0027vMajor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s vMajor field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1449\n\n32. \u0027reserved3\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1450\n\n33. \u0027reserved2\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved2 field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1451\n\n34. \u0027reserved1\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1452\n\n35. \u0027coffFiles\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s coffFiles field is incremented by 1 it evades\n detection. \n\n Affected products -\n McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125, \n Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C,\n Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402,\n Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1453\n\n36. \u0027ei_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C, \n Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1454\n\n37. \u0027vMinor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1455\n\n38. A specially crafted ZIP file, created by concatenating the contents \n of a clean TAR archive and a virus-infected ZIP archive, is parsed \n incorrectly and evades detection. \n\n Affected products -\n AVG 10.0.0.1190, CAT-QuickHeal 11.00, Comodo 7424, Emsisoft 5.1.0.1,\n eSafe 7.0.17.0, F-Prot 4.6.2.117,Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, \n McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, \n Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004\n\n CVE no - \n CVE-2012-1456\n\n39. If the length field in the header of a file with test EICAR virus\n included into a TAR archive is set to be greater than the archive\u0027s total \n length (1,000,000+original length in our experiments), the antivirus \n declares the file to be clean but virus gets extracted correctly by the \n GNU tar program. \n\n Affected products -\n AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, \n AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, \n Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, \n GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, \n Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, \n Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, \n TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0 \n\n CVE no - \n CVE-2012-1457\n\n40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,\n scripts, and images compressed using the LZX algorithm. \n For faster random accesses, the algorithm is reset at intervals\n instead of compressing the entire file as a single stream. The\n length of each interval is specified in the LZXC header. \n\n If an infected CHM file\u0027s header modified so that the reset interval\n is lower than in the original file, the antivirus declares the file\n to be clean. But the Windows CHM viewer hh.exe correctly decompresses\n the infected content located before the tampered header. \n\n Affected products -\n ClamAV 0.96.4, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1458\n\n41. In a POSIX TAR archive, each member file has a 512-byte header protected\n by a simple checksum. Every header also contains a file length field, which\n is used by the extractor to locate the next header in the archive. \n\n If a TAR archive contains two files: the first one is clean, while\n the second is infected with test EICAR virus - and it is modified such that \n the length field in the header of the first, clean file to point into the \n middle of the header of the second, infected file. The antivirus declares \n the file to be clean but virus gets extracted correctly by the \n GNU tar program. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, \n Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2, \n CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Comodo 7424, \n Emsisoft 5.1.0.1, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, \n Fortinent 4.2.254.0, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, \n K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, \n McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795, \n Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7, \n PCTools 7.0.3.5, Rising 22.83.00.03, Sophos 4.61.0, \n Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, \n TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, \n VirusBuster 13.6.151.0 \n\n CVE no - \n CVE-2012-1459\n\n42. If an infected tar.gz archive is appended 6 random bytes at the end, \n the antivirus declares the file to be clean but virus gets extracted by\n the gunzip+tar programs correctly by ignoring these bytes. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, \n eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, \n K7AntiVirus 9.77.3565, VBA32 3.12.14.2 \n \n CVE no - \n CVE-2012-1460\n\n43. GZIP files can contain multiple compressed streams, which are assembled\n when the contents are extracted. If an infected .tar.gz file is broken \n into two streams, the antivirus declares the infected .tar.gz file to \n be clean while tar+gunzip extract the virus correctly\n\n Affected products -\n AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, \n F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, \n Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1461\n\n44. If an infected ZIP archive is prepended with 1024 random bytes at the \n beginning, the antivirus declares the file to be clean but virus gets extracted\n by the unzip program correctly by skipping these bytes\n\n Affected products -\n AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, \n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, \n Symantec 20101.3.0.103 \n\n CVE no - \n CVE-2012-1462\n\n45. In most ELF files, the 5th byte of the header indicates endianness: 01\n for little-endian, 02 for bigendian. Linux kernel, however, does not\n check this field before loading an ELF file. If an infected ELF file\u0027s 5-th \n byte is set to 02, the antivirus declares the file to be clean but the ELF \n file gets executed correctly. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, \n Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7 \n\n CVE no - \n CVE-2012-1463\n\n--------\nCredits\n--------\nVulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov. \n\n-----------\nReferences\n-----------\n\"Abusing File Processing in Malware Detectors for Fun and Profit\" by Suman Jana and Vitaly Shmatikov\nTo appear in IEEE Symposium on Security and Privacy 2012\nhttp://www.ieee-security.org/TC/SP2012/ \n", "sources": [ { "db": "NVD", "id": "CVE-2012-1425" }, { "db": "JVNDB", "id": "JVNDB-2012-001887" }, { "db": "BID", "id": "52580" }, { "db": "VULHUB", "id": "VHN-54706" }, { "db": "PACKETSTORM", "id": "110990" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1425", "trust": 2.9 }, { "db": "OSVDB", "id": "80396", "trust": 1.1 }, { "db": "OSVDB", "id": "80389", "trust": 1.1 }, { "db": "OSVDB", "id": "80391", "trust": 1.1 }, { "db": "OSVDB", "id": "80403", "trust": 1.1 }, { "db": "OSVDB", "id": "80395", "trust": 1.1 }, { "db": "OSVDB", "id": "80392", "trust": 1.1 }, { "db": "OSVDB", "id": "80409", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001887", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19226", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201203-391", "trust": 0.6 }, { "db": "BID", "id": "52580", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-54706", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110990", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54706" }, { "db": "BID", "id": "52580" }, { "db": "JVNDB", "id": "JVNDB-2012-001887" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "CNNVD", "id": "CNNVD-201203-391" }, { "db": "NVD", "id": "CVE-2012-1425" } ] }, "id": "VAR-201203-0385", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54706" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:46:23.773000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.antiy.net/en/index.html" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.avira.com/ja/for-home" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.emsisoft.com/en/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.eset.com/us/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.fortinet.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ikarus.at/en/" }, { "title": "Top Page", "trust": 0.8, "url": "http://global.jiangmin.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.norman.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.pctools.com/jp/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.quickheal.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.symantec.com/ja/jp/" }, { "title": "Top Page", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/home/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.kaspersky.co.jp/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.mcafee.com/japan/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001887" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54706" }, { "db": "JVNDB", "id": "JVNDB-2012-001887" }, { "db": "NVD", "id": "CVE-2012-1425" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://osvdb.org/80389" }, { "trust": 1.1, "url": "http://osvdb.org/80391" }, { "trust": 1.1, "url": "http://osvdb.org/80392" }, { "trust": 1.1, "url": "http://osvdb.org/80395" }, { "trust": 1.1, "url": "http://osvdb.org/80396" }, { "trust": 1.1, "url": "http://osvdb.org/80403" }, { "trust": 1.1, "url": "http://osvdb.org/80409" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1425" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1425" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19226" }, { "trust": 0.3, "url": "http://www.antiy.net" }, { "trust": 0.3, "url": "http://www.avira.com/" }, { "trust": 0.3, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "trust": 0.3, "url": "http://eset.com" }, { "trust": 0.3, "url": "http://www.ikarus.at" }, { "trust": 0.3, "url": "http://global.jiangmin.com/" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.mcafee.com/" }, { "trust": 0.3, "url": "http://anti-virus-software-review.toptenreviews.com/norman-review.html" }, { "trust": 0.3, "url": "http://www.pctools.com/spyware-doctor-antivirus/" }, { "trust": 0.3, "url": "http://www.quickheal.com/" }, { "trust": 0.3, "url": "http://www.symantec.com" }, { "trust": 0.3, "url": "http://www.trend.com" }, { "trust": 0.3, "url": "/archive/1/522005" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1419" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1439" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1426" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1429" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1436" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1440" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1432" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1438" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1428" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1446" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1443" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1444" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1441" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1421" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1430" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1434" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1435" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1424" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1431" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1425" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1423" }, { "trust": 0.1, "url": "http://www.ieee-security.org/tc/sp2012/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1442" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1422" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1433" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1420" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1445" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1437" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54706" }, { "db": "BID", "id": "52580" }, { "db": "JVNDB", "id": "JVNDB-2012-001887" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "CNNVD", "id": "CNNVD-201203-391" }, { "db": "NVD", "id": "CVE-2012-1425" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54706" }, { "db": "BID", "id": "52580" }, { "db": "JVNDB", "id": "JVNDB-2012-001887" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "CNNVD", "id": "CNNVD-201203-391" }, { "db": "NVD", "id": "CVE-2012-1425" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54706" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52580" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001887" }, { "date": "2012-03-19T23:51:01", "db": "PACKETSTORM", "id": "110990" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-391" }, { "date": "2012-03-21T10:11:47.397000", "db": "NVD", "id": "CVE-2012-1425" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-08-14T00:00:00", "db": "VULHUB", "id": "VHN-54706" }, { "date": "2012-03-30T16:10:00", "db": "BID", "id": "52580" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001887" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-391" }, { "date": "2024-11-21T01:36:57.320000", "db": "NVD", "id": "CVE-2012-1425" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-391" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products TAR Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001887" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-391" } ], "trust": 0.6 } }
var-201203-0146
Vulnerability from variot
The Gzip file parser in AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with multiple compressed streams. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations. Multiple products Gzip A file parser contains a vulnerability that can prevent malware detection. Different Gzip If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.Have multiple compressed streams by a third party .tar.gz Malware detection may be avoided via files. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0146", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "command antivirus", "scope": "eq", "trust": 1.8, "vendor": "authentium", "version": "5.2.11.5" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "avg", "version": "10.0.0.1190" }, { "model": "bitdefender", "scope": "eq", "trust": 1.8, "vendor": "bitdefender", "version": "7.2" }, { "model": "anti-malware", "scope": "eq", "trust": 1.8, "vendor": "emsisoft", "version": "5.1.0.1" }, { "model": "virus utilities t3 command line scanner", "scope": "eq", "trust": 1.8, "vendor": "ikarus", "version": "1.1.97.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.8, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "sophos", "version": "4.61.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "scan engine", "scope": "eq", "trust": 1.8, "vendor": "mcafee", "version": "5.400.0.1158" }, { "model": "housecall", "scope": "eq", "trust": 1.6, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "trend micro antivirus", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "k7computing", "version": "9.77.3565" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "5795" }, { "model": "vba32", "scope": "eq", "trust": 1.0, "vendor": "anti virus", "version": "3.12.14.2" }, { "model": "endpoint protection", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "11.0" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "antivirus \\\u0026 antispyware", "scope": "eq", "trust": 1.0, "vendor": "norman", "version": "6.06.12" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "nod32 anti-virus", "scope": "eq", "trust": 0.8, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "k7 computing", "version": "9.77.3565" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "vba32", "scope": "eq", "trust": 0.8, "vendor": "virusblokada", "version": "3.12.14.2" }, { "model": "endpoint protection", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "11" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "housecall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "vba32", "scope": "eq", "trust": 0.3, "vendor": "virusblokada", "version": "3.12.142" }, { "model": "trend micro", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "housecall", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20101.3103" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "norman", "version": "6.6.12" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "7.0125" }, { "model": "computing pvt ltd k7antivirus", "scope": "eq", "trust": 0.3, "vendor": "k7", "version": "9.77.3565" }, { "model": "jiangmin", "scope": "eq", "trust": 0.3, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus t3.1.1.97.0", "scope": null, "trust": 0.3, "vendor": "ikarus", "version": null }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.2.2540" }, { "model": "nod32", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "comodo", "version": "7424" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "bitdefender", "version": "7.2" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "avg", "version": "10.01190" }, { "model": "command antivirus", "scope": "eq", "trust": 0.3, "vendor": "authentium", "version": "5.2.115" } ], "sources": [ { "db": "BID", "id": "52626" }, { "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "db": "CNNVD", "id": "CNNVD-201203-424" }, { "db": "NVD", "id": "CVE-2012-1461" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:authentium:command_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avg:avg_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:rising-global:rising_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:bitdefender:bitdefender", "vulnerable": true }, { "cpe22Uri": "cpe:/a:emsisoft:anti-malware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:eset:nod32_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ikarus:ikarus_virus_utilities_t3_command_line_scanner", "vulnerable": true }, { "cpe22Uri": "cpe:/a:jiangmin:jiangmin_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:k7computing:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:norman:norman_antivirus_%26_antispyware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:anti-virus:vba32", "vulnerable": true }, { "cpe22Uri": "cpe:/a:f-secure:anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:kaspersky:kaspersky_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:endpoint_protection", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sophos:anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:trend_micro_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:housecall", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fortinet:fortinet_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:scan_engine", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:web_gateway", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001901" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52626" } ], "trust": 0.3 }, "cve": "CVE-2012-1461", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2012-1461", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54742", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-1461", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-1461", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201203-424", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54742", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54742" }, { "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "db": "CNNVD", "id": "CNNVD-201203-424" }, { "db": "NVD", "id": "CVE-2012-1461" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Gzip file parser in AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with multiple compressed streams. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations. Multiple products Gzip A file parser contains a vulnerability that can prevent malware detection. Different Gzip If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.Have multiple compressed streams by a third party .tar.gz Malware detection may be avoided via files. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection", "sources": [ { "db": "NVD", "id": "CVE-2012-1461" }, { "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "db": "BID", "id": "52626" }, { "db": "VULHUB", "id": "VHN-54742" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1461", "trust": 2.8 }, { "db": "BID", "id": "52626", "trust": 1.4 }, { "db": "OSVDB", "id": "80510", "trust": 1.1 }, { "db": "OSVDB", "id": "80501", "trust": 1.1 }, { "db": "OSVDB", "id": "80500", "trust": 1.1 }, { "db": "OSVDB", "id": "80504", "trust": 1.1 }, { "db": "OSVDB", "id": "80505", "trust": 1.1 }, { "db": "OSVDB", "id": "80503", "trust": 1.1 }, { "db": "OSVDB", "id": "80502", "trust": 1.1 }, { "db": "OSVDB", "id": "80506", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001901", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-424", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19199", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-54742", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54742" }, { "db": "BID", "id": "52626" }, { "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "db": "CNNVD", "id": "CNNVD-201203-424" }, { "db": "NVD", "id": "CVE-2012-1461" } ] }, "id": "VAR-201203-0146", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54742" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:46:24.134000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Command Antivirus", "trust": 0.8, "url": "http://www.authentium.com/command/CSAVDownload.html" }, { "title": "AVG Anti-Virus", "trust": 0.8, "url": "http://www.avgjapan.com/home-small-office-security/buy-antivirus" }, { "title": "Rising Antivirus", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Bitdefender", "trust": 0.8, "url": "http://www.bitdefender.com/" }, { "title": "Emsisoft Anti-Malware", "trust": 0.8, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "title": "ESET NOD32\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9", "trust": 0.8, "url": "http://www.eset.com/us/" }, { "title": "Fortinet Antivirus", "trust": 0.8, "url": "http://www.fortinet.com/solutions/antivirus.html" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ikarus.at/en/" }, { "title": "Jiangmin Antivirus", "trust": 0.8, "url": "http://global.jiangmin.com/" }, { "title": "K7 AntiVirus", "trust": 0.8, "url": "http://www.k7computing.com/en/consumer_home.php" }, { "title": "McAfee Scan Engine", "trust": 0.8, "url": "http://www.mcafee.com/us/support/support-eol-scan-engine.aspx" }, { "title": "McAfee Web Gateway", "trust": 0.8, "url": "http://www.mcafee.com/us/products/web-gateway.aspx" }, { "title": "Norman Antivirus", "trust": 0.8, "url": "http://www.norman.com/products/antivirus_antispyware/en" }, { "title": "Sophos Anti-Virus", "trust": 0.8, "url": "http://www.sophos.com/ja-jp/" }, { "title": "Endpoint Protection", "trust": 0.8, "url": "http://www.symantec.com/ja/jp/endpoint-protection" }, { "title": "Top Page", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/home/index.html" }, { "title": "Trend Micro HouseCall", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/tools/housecall/index.html" }, { "title": "VBA32", "trust": 0.8, "url": "http://anti-virus.by/en/index.shtml" }, { "title": "Kaspersky Anti-Virus", "trust": 0.8, "url": "http://www.kaspersky.com/kaspersky_anti-virus" }, { "title": "F-Secure Anti-Virus", "trust": 0.8, "url": "http://www.f-secure.com/ja/web/home_jp/protection/anti-virus/overview" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001901" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54742" }, { "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "db": "NVD", "id": "CVE-2012-1461" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/52626" }, { "trust": 1.1, "url": "http://osvdb.org/80500" }, { "trust": 1.1, "url": "http://osvdb.org/80501" }, { "trust": 1.1, "url": "http://osvdb.org/80502" }, { "trust": 1.1, "url": "http://osvdb.org/80503" }, { "trust": 1.1, "url": "http://osvdb.org/80504" }, { "trust": 1.1, "url": "http://osvdb.org/80505" }, { "trust": 1.1, "url": "http://osvdb.org/80506" }, { "trust": 1.1, "url": "http://osvdb.org/80510" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1461" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1461" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19199" }, { "trust": 0.3, "url": "http://www.avg.com" }, { "trust": 0.3, "url": "http://www.bitdefender.com" }, { "trust": 0.3, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "trust": 0.3, "url": "http://www.ikarus.at" }, { "trust": 0.3, "url": "http://global.jiangmin.com/" }, { "trust": 0.3, "url": "http://www.k7computing.com/en/product/k7-antivirusplus.php" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.mcafee.com/" }, { "trust": 0.3, "url": "http://anti-virus-software-review.toptenreviews.com/norman-review.html" }, { "trust": 0.3, "url": "http://www.rising-global.com/" }, { "trust": 0.3, "url": "http://www.symantec.com" }, { "trust": 0.3, "url": "http://www.trend.com" }, { "trust": 0.3, "url": "/archive/1/522005" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54742" }, { "db": "BID", "id": "52626" }, { "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "db": "CNNVD", "id": "CNNVD-201203-424" }, { "db": "NVD", "id": "CVE-2012-1461" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54742" }, { "db": "BID", "id": "52626" }, { "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "db": "CNNVD", "id": "CNNVD-201203-424" }, { "db": "NVD", "id": "CVE-2012-1461" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54742" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52626" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "date": "2012-03-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-424" }, { "date": "2012-03-21T10:11:49.677000", "db": "NVD", "id": "CVE-2012-1461" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-11-06T00:00:00", "db": "VULHUB", "id": "VHN-54742" }, { "date": "2012-03-30T16:20:00", "db": "BID", "id": "52626" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-424" }, { "date": "2024-11-21T01:37:02.423000", "db": "NVD", "id": "CVE-2012-1461" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-424" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products Gzip Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001901" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-424" } ], "trust": 0.6 } }
var-201203-0367
Vulnerability from variot
The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations. Multiple products RAR A file parser contains a vulnerability that can prevent malware detection. Different RAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By the attacker, MZ Has a character sequence starting with RAR Malware detection may be avoided via files. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Sophos Anti-Virus is a set of anti-virus software for various operating systems from Sophos, UK. The software detects and removes viruses, spyware, trojans and worms in real time, ensuring comprehensive network protection for desktops and laptops. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All affected products are command-line versions of the AVs.
Vulnerability Descriptions
- Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes evades detection.
Affected products - ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no - CVE-2012-1419
- Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, Rising 22.83.00.03
CVE no - CVE-2012-1420
- Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, Symantec 20101.3.0.103
CVE no - CVE-2012-1421
- Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1422
- Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes evades detection.
Affected products - Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no - CVE-2012-1423
- Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8 evades detection.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, PCTools 7.0.3.5, Sophos 4.61.0
CVE no - CVE-2012-1424
- Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first 4 bytes evades detection.
Affected products - AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1, Fortinet 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no - CVE-2012-1425
- Specially crafted infected POSIX TAR files with "\42\5A\68" as the first 3 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1426
- Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1427
- Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1428
- Specially crafted infected ELF files with "ustar" at offset 257 evades detection.
Affected products - BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no - CVE-2012-1429 12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades detection.
Affected products - BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no - CVE-2012-1430 13. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no - CVE-2012-1431
- Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1432
- Specially crafted infected MS EXE files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1433
- Specially crafted infected MS EXE files with "\19\04\00\10" at offset 8 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1434
- Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at offset 30 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1435
- Specially crafted infected MS EXE files with "\2D\6C\68" at offset 2 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1436
- Specially crafted infected MS Office files with "\50\4B\53\70\58" at offset 526 evades detection.
Affected products - Comodo 7425
CVE no - CVE-2012-1437
- Specially crafted infected MS Office files with "ustar" at offset 257 evades detection.
Affected products - Comodo 7425, Sophos 4.61.0
CVE no - CVE-2012-1438
- 'padding' field in ELF files is parsed incorrectly. If an infected ELF file's padding field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1439
- 'identsize' field in ELF files is parsed incorrectly. If an infected ELF file's identsize field is incremented by 1 it evades detection.
Affected products - Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1440
- 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1 it evades detection.
Affected products - Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0
CVE no - CVE-2012-1441
- 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0, Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1442
- Infected RAR files with initial two bytes set to 'MZ' can be fixed by the user and correctly extracted. Such a file evades detection.
Affected products - ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0 nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no - CVE-2012-1443
- 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1444
- 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1445
- 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, McAfee 5.400.0.1158, Symantec 20101.3.0.103, Norman 6.06.12, eSafe 7.0.017.0, Kaspersky 7.0.0.125, McAfee-GW-Edition 2010.1C, Sophos 4.61.0, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, PCTools 7.0.3.5, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1446
- 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades detection.
Affected products - Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no - CVE-2012-1447
- 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0 TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no - CVE-2012-1448
- 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1449
- 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1450
- 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1451
- 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no - CVE-2012-1452
- 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades detection.
Affected products - McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125, Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C, Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402, Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1453
- 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades detection.
Affected products - McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1454
- 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1455
- A specially crafted ZIP file, created by concatenating the contents of a clean TAR archive and a virus-infected ZIP archive, is parsed incorrectly and evades detection.
Affected products - AVG 10.0.0.1190, CAT-QuickHeal 11.00, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117,Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no - CVE-2012-1456
- If the length field in the header of a file with test EICAR virus included into a TAR archive is set to be greater than the archive's total length (1,000,000+original length in our experiments), the antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program.
Affected products - AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no - CVE-2012-1457
- A Windows Compiled HTML Help (CHM) file is a set of HTML files, scripts, and images compressed using the LZX algorithm. For faster random accesses, the algorithm is reset at intervals instead of compressing the entire file as a single stream. The length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval is lower than in the original file, the antivirus declares the file to be clean. But the Windows CHM viewer hh.exe correctly decompresses the infected content located before the tampered header.
Affected products - ClamAV 0.96.4, Sophos 4.61.0
CVE no - CVE-2012-1458
- In a POSIX TAR archive, each member file has a 512-byte header protected by a simple checksum. Every header also contains a file length field, which is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while the second is infected with test EICAR virus - and it is modified such that the length field in the header of the first, clean file to point into the middle of the header of the second, infected file. The antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, the antivirus declares the file to be clean but virus gets extracted by the gunzip+tar programs correctly by ignoring these bytes.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no - CVE-2012-1460
- GZIP files can contain multiple compressed streams, which are assembled when the contents are extracted. If an infected .tar.gz file is broken into two streams, the antivirus declares the infected .tar.gz file to be clean while tar+gunzip extract the virus correctly
Affected products - AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no - CVE-2012-1461
- If an infected ZIP archive is prepended with 1024 random bytes at the beginning, the antivirus declares the file to be clean but virus gets extracted by the unzip program correctly by skipping these bytes
Affected products - AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, Symantec 20101.3.0.103
CVE no - CVE-2012-1462
- In most ELF files, the 5th byte of the header indicates endianness: 01 for little-endian, 02 for bigendian. Linux kernel, however, does not check this field before loading an ELF file. If an infected ELF file's 5-th byte is set to 02, the antivirus declares the file to be clean but the ELF file gets executed correctly.
Affected products - AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no - CVE-2012-1463
Credits
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
References
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov To appear in IEEE Symposium on Security and Privacy 2012 http://www.ieee-security.org/TC/SP2012/
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0367", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "antivirus", "scope": "eq", "trust": 2.1, "vendor": "comodo", "version": "7424" }, { "model": "avl sdk", "scope": "eq", "trust": 1.8, "vendor": "antiy", "version": "2.0.3.7" }, { "model": "command antivirus", "scope": "eq", "trust": 1.8, "vendor": "authentium", "version": "5.2.11.5" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "avg", "version": "10.0.0.1190" }, { "model": "bitdefender", "scope": "eq", "trust": 1.8, "vendor": "bitdefender", "version": "7.2" }, { "model": "clamav", "scope": "eq", "trust": 1.8, "vendor": "clamav", "version": "0.96.4" }, { "model": "anti-malware", "scope": "eq", "trust": 1.8, "vendor": "emsisoft", "version": "5.1.0.1" }, { "model": "virus utilities t3 command line scanner", "scope": "eq", "trust": 1.8, "vendor": "ikarus", "version": "1.1.97.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "pc tools", "version": "7.0.3.5" }, { "model": "virusbuster", "scope": "eq", "trust": 1.8, "vendor": "virusbuster", "version": "13.6.151.0" }, { "model": "esafe", "scope": "eq", "trust": 1.8, "vendor": "aladdin", "version": "7.0.17.0" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.8, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "sophos", "version": "4.61.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "security essentials", "scope": "eq", "trust": 1.8, "vendor": "microsoft", "version": "2.0" }, { "model": "scan engine", "scope": "eq", "trust": 1.8, "vendor": "mcafee", "version": "5.400.0.1158" }, { "model": "endpoint protection", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "11.0" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "5.0.677.0" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "4.8.1351.0" }, { "model": "v3 internet security", "scope": "eq", "trust": 1.0, "vendor": "ahnlab", "version": "2011.01.18.00" }, { "model": "trend micro antivirus", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "g data antivirus", "scope": "eq", "trust": 1.0, "vendor": "gdata", "version": "21" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "k7computing", "version": "9.77.3565" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "5795" }, { "model": "vba32", "scope": "eq", "trust": 1.0, "vendor": "anti virus", "version": "3.12.14.2" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "panda antivirus", "scope": "eq", "trust": 1.0, "vendor": "pandasecurity", "version": "10.0.2.7" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "antivirus \\\u0026 antispyware", "scope": "eq", "trust": 1.0, "vendor": "norman", "version": "6.06.12" }, { "model": "housecall", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "quick heal", "scope": "eq", "trust": 1.0, "vendor": "cat", "version": "11.00" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 1.0, "vendor": "f prot", "version": "4.6.2.117" }, { "model": "antivir", "scope": "eq", "trust": 1.0, "vendor": "avira", "version": "7.11.1.163" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "4.8.1351.0" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "5.0.677.0" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "avira", "version": "7.11.1.163" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "nod32 anti-virus", "scope": "eq", "trust": 0.8, "vendor": "eset", "version": "5795" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 0.8, "vendor": "frisk", "version": "4.6.2.117" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "g data", "version": "21" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "k7 computing", "version": "9.77.3565" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "panda security", "version": "10.0.2.7" }, { "model": "vba32", "scope": "eq", "trust": 0.8, "vendor": "virusblokada", "version": "3.12.14.2" }, { "model": "v3 internet security", "scope": "eq", "trust": 0.8, "vendor": "unlab", "version": "2011.01.18.00" }, { "model": "heal", "scope": "eq", "trust": 0.8, "vendor": "quick heal k k", "version": "11.00" }, { "model": "endpoint protection", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "11" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "housecall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "vba32", "scope": "eq", "trust": 0.3, "vendor": "virusblokada", "version": "3.12.142" }, { "model": "virusbuster", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "13.6.1510" }, { "model": "trend micro", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "housecall", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20101.3103" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "4.61" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "cat-quickheal", "scope": "eq", "trust": 0.3, "vendor": "quick heal", "version": "11.00" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "pctools", "version": "7.0.35" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "10.0.27" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "norman", "version": "6.6.12" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "computing pvt ltd k7antivirus", "scope": "eq", "trust": 0.3, "vendor": "k7", "version": "9.77.3565" }, { "model": "nprotect", "scope": "eq", "trust": 0.3, "vendor": "inca", "version": "2011-01-17.01" }, { "model": "antivirus t3.1.1.97.0", "scope": null, "trust": 0.3, "vendor": "ikarus", "version": null }, { "model": "data software gdata", "scope": "eq", "trust": 0.3, "vendor": "g", "version": "21" }, { "model": "software f-prot antivirus", "scope": "eq", "trust": 0.3, "vendor": "frisk", "version": "4.6.2117" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.2.2540" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "nod32", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "esafe", "version": "7.0.170" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "bitdefender", "version": "7.2" }, { "model": "antivir engine", "scope": "eq", "trust": 0.3, "vendor": "avira", "version": "7.11.1163" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "avg", "version": "10.01190" }, { "model": "avast5 antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "5.0.6770" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.8.1351.0" }, { "model": "command antivirus", "scope": "eq", "trust": 0.3, "vendor": "authentium", "version": "5.2.115" }, { "model": "antiy-avl", "scope": "eq", "trust": 0.3, "vendor": "antiy", "version": "2.0.37" }, { "model": "engine", "scope": "eq", "trust": 0.3, "vendor": "ahnlab", "version": "v32011.01.18.00" } ], "sources": [ { "db": "BID", "id": "52612" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "CNNVD", "id": "CNNVD-201203-407" }, { "db": "NVD", "id": "CVE-2012-1443" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:antiy:avl_sdk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:authentium:command_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avast:avast_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avg:avg_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avira:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:rising-global:rising_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:bitdefender:bitdefender", "vulnerable": true }, { "cpe22Uri": "cpe:/a:clamav:clamav", "vulnerable": true }, { "cpe22Uri": "cpe:/a:comodo:comodo_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:emsisoft:anti-malware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:eset:nod32_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:f-prot:f-prot_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:gdata-software:g_data_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ikarus:ikarus_virus_utilities_t3_command_line_scanner", "vulnerable": true }, { "cpe22Uri": "cpe:/a:jiangmin:jiangmin_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:k7computing:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:norman:norman_antivirus_%26_antispyware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nprotect:nprotect_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:pandasecurity:panda_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:pc_tools:pc_tools_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:anti-virus:vba32", "vulnerable": true }, { "cpe22Uri": "cpe:/a:virusbuster:virusbuster", "vulnerable": true }, { "cpe22Uri": "cpe:/a:aladdin:esafe", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ahnlab:v3_internet_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:f-secure:anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:kaspersky:kaspersky_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:quick_heal:quick_heal", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:endpoint_protection", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sophos:anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:trend_micro_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:housecall", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fortinet:fortinet_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:microsoft:security_essentials", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:scan_engine", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:web_gateway", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001895" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52612" } ], "trust": 0.3 }, "cve": "CVE-2012-1443", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2012-1443", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54724", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-1443", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-1443", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201203-407", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54724", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54724" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "CNNVD", "id": "CNNVD-201203-407" }, { "db": "NVD", "id": "CVE-2012-1443" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations. Multiple products RAR A file parser contains a vulnerability that can prevent malware detection. Different RAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By the attacker, MZ Has a character sequence starting with RAR Malware detection may be avoided via files. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Sophos Anti-Virus is a set of anti-virus software for various operating systems from Sophos, UK. The software detects and removes viruses, spyware, trojans and worms in real time, ensuring comprehensive network protection for desktops and laptops. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All \naffected products are command-line versions of \nthe AVs. \n\n----------------------------\nVulnerability Descriptions\n----------------------------\n\n1. Specially crafted infected POSIX TAR files with \"[aliases]\" as first 9 bytes \n evades detection. \n\n Affected products -\n ClamAV 0.96.4, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1419\n\n2. Specially crafted infected POSIX TAR files with \"\\7fELF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, \n Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1420\n\n3. Specially crafted infected POSIX TAR files with \"MSCF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, \n Symantec 20101.3.0.103\n\n CVE no - \n CVE-2012-1421\n\n4. Specially crafted infected POSIX TAR files with \"ITSF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1422\n\n5. Specially crafted infected POSIX TAR files with \"MZ\" as first 2 bytes \n evades detection. \n\n Affected products -\n Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, \n Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, \n PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0\n\n CVE no - \n CVE-2012-1423\n\n6. Specially crafted infected POSIX TAR files with \"\\19\\04\\00\\10\" at offset 8\n evades detection. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, \n PCTools 7.0.3.5, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1424\n\n\n7. Specially crafted infected POSIX TAR files with \"\\50\\4B\\03\\04\" as the first\n 4 bytes evades detection. \n\n Affected products -\n AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1,\n Fortinet 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, \n Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004 \n\n CVE no - \n CVE-2012-1425\n\n8. Specially crafted infected POSIX TAR files with \"\\42\\5A\\68\" as the first\n 3 bytes evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1426\n\n\n9. Specially crafted infected POSIX TAR files with \"\\57\\69\\6E\\5A\\69\\70\" at \n offset 29 evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1427\n\n10. Specially crafted infected POSIX TAR files with \"\\4a\\46\\49\\46\" at offset 6\n evades detection. \n \n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1428\n\n11. Specially crafted infected ELF files with \"ustar\" at offset 257\n evades detection. \n\n Affected products -\n BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, \n McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01 \n\n CVE no - \n CVE-2012-1429\n12. Specially crafted infected ELF files with \"\\19\\04\\00\\10\" at offset 8 evades\n detection. \n\n Affected products -\n BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, \n Sophos 4.61.0, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1430\n13. Specially crafted infected ELF files with \"\\4a\\46\\49\\46\" at offset 6 evades\n detection. \n\n Affected products -\n BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, \n F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, \n nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1431\n\n14. Specially crafted infected MS EXE files with \"\\57\\69\\6E\\5A\\69\\70\" at offset\n 29 evades detection. \n\n Affected products -\n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1432\n\n15. Specially crafted infected MS EXE files with \"\\4a\\46\\49\\46\" at offset\n 6 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1433\n\n16. Specially crafted infected MS EXE files with \"\\19\\04\\00\\10\" at offset\n 8 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, \n Panda 10.0.2.7\n \n CVE no - \n CVE-2012-1434\n\n17. Specially crafted infected MS EXE files with \"\\50\\4B\\4C\\49\\54\\45\" at \n offset 30 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1435\n\n18. Specially crafted infected MS EXE files with \"\\2D\\6C\\68\" at \n offset 2 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1436\n\n19. Specially crafted infected MS Office files with \"\\50\\4B\\53\\70\\58\" at \n offset 526 evades detection. \n \n Affected products - \n Comodo 7425\n \n CVE no - \n CVE-2012-1437\n\n20. Specially crafted infected MS Office files with \"ustar\" at \n offset 257 evades detection. \n\n Affected products - \n Comodo 7425, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1438\n\n21. \u0027padding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s padding field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1439\n\n22. \u0027identsize\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s identsize field is incremented by 1 it evades\n detection. \n\n Affected products - \n Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1440\n\n23. \u0027e_ip\u0027 and \u0027e_res\u0027 field in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n Prevx 3.0\n\n \u0027e_minalloc\u0027, \u0027e_res2\u0027,\u0027e_cparhdr\u0027, \u0027e_crlc\u0027, \u0027e_lfarlc\u0027,\u0027e_maxalloc\u0027,\n \u0027e_oeminfo\u0027, \u0027e_ovno\u0027, \u0027e_cs\u0027, \u0027e_csum\u0027,\u0027e_sp\u0027, \u0027e_ss\u0027, \u0027e_cblp\u0027 and \n \u0027e_oemid\u0027 fields in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0\n\n\n CVE no - \n CVE-2012-1441\n\n24. \u0027class\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s class field is incremented by 1 it evades\n detection. \n\n Affected products - \n CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0, \n Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1442\n\n25. Infected RAR files with initial two bytes set to \u0027MZ\u0027 can be fixed by the \n user and correctly extracted. Such a file evades detection. \n \n Affected products -\n ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, \n Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, \n Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, \n VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, \n K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 \n Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, \n Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, \n TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0\n nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, \n Avast5 5.0.677.0, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1443\n\n26. \u0027abiversion\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abiversion field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1444\n\n27. \u0027abi\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abi field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1445\n\n28. \u0027encoding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s encoding field is incremented by 1 it evades\n detection. \n\n Affected products - \n CAT-QuickHeal 11.00, McAfee 5.400.0.1158, Symantec 20101.3.0.103, \n Norman 6.06.12, eSafe 7.0.017.0, Kaspersky 7.0.0.125, \n McAfee-GW-Edition 2010.1C, Sophos 4.61.0, eTrust-Vet 36.1.8511, \n Antiy-AVL 2.0.3.7, PCTools 7.0.3.5, Rising 22.83.00.03, Fortinet 4.2.254.0,\n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1446\n\n29. \u0027e_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s e_version field is incremented by 1 it evades\n detection. \n\n Affected products -\n Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1447\n\n30. \u0027cbCabinet\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s cbCabinet field is incremented by 1 it evades\n detection. \n\n Affected products -\n CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0\n TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1 \n\n CVE no - \n CVE-2012-1448\n\n31. \u0027vMajor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s vMajor field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1449\n\n32. \u0027reserved3\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1450\n\n33. \u0027reserved2\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved2 field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1451\n\n34. \u0027reserved1\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1452\n\n35. \u0027coffFiles\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s coffFiles field is incremented by 1 it evades\n detection. \n\n Affected products -\n McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125, \n Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C,\n Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402,\n Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1453\n\n36. \u0027ei_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C, \n Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1454\n\n37. \u0027vMinor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1455\n\n38. A specially crafted ZIP file, created by concatenating the contents \n of a clean TAR archive and a virus-infected ZIP archive, is parsed \n incorrectly and evades detection. \n\n Affected products -\n AVG 10.0.0.1190, CAT-QuickHeal 11.00, Comodo 7424, Emsisoft 5.1.0.1,\n eSafe 7.0.17.0, F-Prot 4.6.2.117,Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, \n McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, \n Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004\n\n CVE no - \n CVE-2012-1456\n\n39. If the length field in the header of a file with test EICAR virus\n included into a TAR archive is set to be greater than the archive\u0027s total \n length (1,000,000+original length in our experiments), the antivirus \n declares the file to be clean but virus gets extracted correctly by the \n GNU tar program. \n\n Affected products -\n AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, \n AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, \n Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, \n GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, \n Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, \n Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, \n TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0 \n\n CVE no - \n CVE-2012-1457\n\n40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,\n scripts, and images compressed using the LZX algorithm. \n For faster random accesses, the algorithm is reset at intervals\n instead of compressing the entire file as a single stream. The\n length of each interval is specified in the LZXC header. \n\n If an infected CHM file\u0027s header modified so that the reset interval\n is lower than in the original file, the antivirus declares the file\n to be clean. But the Windows CHM viewer hh.exe correctly decompresses\n the infected content located before the tampered header. \n\n Affected products -\n ClamAV 0.96.4, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1458\n\n41. In a POSIX TAR archive, each member file has a 512-byte header protected\n by a simple checksum. Every header also contains a file length field, which\n is used by the extractor to locate the next header in the archive. \n\n If a TAR archive contains two files: the first one is clean, while\n the second is infected with test EICAR virus - and it is modified such that \n the length field in the header of the first, clean file to point into the \n middle of the header of the second, infected file. The antivirus declares \n the file to be clean but virus gets extracted correctly by the \n GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, \n the antivirus declares the file to be clean but virus gets extracted by\n the gunzip+tar programs correctly by ignoring these bytes. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, \n eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, \n K7AntiVirus 9.77.3565, VBA32 3.12.14.2 \n \n CVE no - \n CVE-2012-1460\n\n43. GZIP files can contain multiple compressed streams, which are assembled\n when the contents are extracted. If an infected .tar.gz file is broken \n into two streams, the antivirus declares the infected .tar.gz file to \n be clean while tar+gunzip extract the virus correctly\n\n Affected products -\n AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, \n F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, \n Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1461\n\n44. If an infected ZIP archive is prepended with 1024 random bytes at the \n beginning, the antivirus declares the file to be clean but virus gets extracted\n by the unzip program correctly by skipping these bytes\n\n Affected products -\n AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, \n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, \n Symantec 20101.3.0.103 \n\n CVE no - \n CVE-2012-1462\n\n45. In most ELF files, the 5th byte of the header indicates endianness: 01\n for little-endian, 02 for bigendian. Linux kernel, however, does not\n check this field before loading an ELF file. If an infected ELF file\u0027s 5-th \n byte is set to 02, the antivirus declares the file to be clean but the ELF \n file gets executed correctly. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, \n Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7 \n\n CVE no - \n CVE-2012-1463\n\n--------\nCredits\n--------\nVulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov. \n\n-----------\nReferences\n-----------\n\"Abusing File Processing in Malware Detectors for Fun and Profit\" by Suman Jana and Vitaly Shmatikov\nTo appear in IEEE Symposium on Security and Privacy 2012\nhttp://www.ieee-security.org/TC/SP2012/ \n", "sources": [ { "db": "NVD", "id": "CVE-2012-1443" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "BID", "id": "52612" }, { "db": "VULHUB", "id": "VHN-54724" }, { "db": "PACKETSTORM", "id": "110990" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1443", "trust": 2.9 }, { "db": "BID", "id": "52612", "trust": 1.4 }, { "db": "OSVDB", "id": "80469", "trust": 1.1 }, { "db": "OSVDB", "id": "80461", "trust": 1.1 }, { "db": "OSVDB", "id": "80454", "trust": 1.1 }, { "db": "OSVDB", "id": "80455", "trust": 1.1 }, { "db": "OSVDB", "id": "80467", "trust": 1.1 }, { "db": "OSVDB", "id": "80468", "trust": 1.1 }, { "db": "OSVDB", "id": "80471", "trust": 1.1 }, { "db": "OSVDB", "id": "80456", "trust": 1.1 }, { "db": "OSVDB", "id": "80459", "trust": 1.1 }, { "db": "OSVDB", "id": "80472", "trust": 1.1 }, { "db": "OSVDB", "id": "80470", "trust": 1.1 }, { "db": "OSVDB", "id": "80457", "trust": 1.1 }, { "db": "OSVDB", "id": "80460", "trust": 1.1 }, { "db": "OSVDB", "id": "80458", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001895", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-407", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19198", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-54724", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110990", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54724" }, { "db": "BID", "id": "52612" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "CNNVD", "id": "CNNVD-201203-407" }, { "db": "NVD", "id": "CVE-2012-1443" } ] }, "id": "VAR-201203-0367", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54724" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:46:28.266000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AVL SDK", "trust": 0.8, "url": "http://www.antiy.net/en/avlsdk.html" }, { "title": "Command Antivirus", "trust": 0.8, "url": "http://www.authentium.com/command/CSAVDownload.html" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.avast.co.jp/index" }, { "title": "AVG Anti-Virus", "trust": 0.8, "url": "http://www.avgjapan.com/home-small-office-security/buy-antivirus" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.avira.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.bitdefender.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.clamav.net/lang/en/" }, { "title": "Comodo Antivirus", "trust": 0.8, "url": "http://www.comodo.com/home/internet-security/antivirus.php" }, { "title": "Emsisoft Anti-Malware", "trust": 0.8, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "title": "ESET NOD32\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9", "trust": 0.8, "url": "http://www.eset.com/us/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.fortinet.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.f-prot.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.gdata.co.jp/" }, { "title": "IKARUS virus.utilities", "trust": 0.8, "url": "http://www.ikarus.at/en/ngo-gov/products/virus_utilities/index.html" }, { "title": "Jiangmin Antivirus", "trust": 0.8, "url": "http://global.jiangmin.com/" }, { "title": "K7 AntiVirus", "trust": 0.8, "url": "http://www.k7computing.com/en/Product/k7-antivirusplus.php" }, { "title": "MacAfee Scan Engine", "trust": 0.8, "url": "http://www.mcafee.com/us/support/support-eol-scan-engine.aspx" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.norman.com/" }, { "title": "nProtect Anti-Virus", "trust": 0.8, "url": "http://global.nprotect.com/product/avs.php" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ps-japan.co.jp/" }, { "title": "PC Tools AntiVirus", "trust": 0.8, "url": "http://www.pctools.com/jp/spyware-doctor-antivirus/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.quickheal.com/" }, { "title": "Endpoint Protection", "trust": 0.8, "url": "http://www.symantec.com/ja/jp/endpoint-protection" }, { "title": "Top Page", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/home/" }, { "title": "Trend Micro HouseCall", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/tools/housecall/" }, { "title": "Top Page", "trust": 0.8, "url": "http://anti-virus.by/en" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.virusbuster.hu/en" }, { "title": "eSafe", "trust": 0.8, "url": "http://www.aladdin.co.jp/esafe/" }, { "title": "V3 Internet Security", "trust": 0.8, "url": "http://www.ahnlab.co.jp/product_service/product/b2b/v3is8.asp" }, { "title": "Kaspersky Anti-Virus", "trust": 0.8, "url": "http://www.kaspersky.com/kaspersky_anti-virus" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.sophos.com" }, { "title": "Microsoft Security Essentials", "trust": 0.8, "url": "http://windows.microsoft.com/ja-JP/windows/products/security-essentials" }, { "title": "McAfee Web Gateway", "trust": 0.8, "url": "http://www.mcafee.com/japan/products/web_gateway.asp" }, { "title": "F-Secure Anti-Virus", "trust": 0.8, "url": "http://www.f-secure.com/ja/web/home_jp/protection/anti-virus/overview" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001895" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54724" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "NVD", "id": "CVE-2012-1443" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/52612" }, { "trust": 1.1, "url": "http://osvdb.org/80454" }, { "trust": 1.1, "url": "http://osvdb.org/80455" }, { "trust": 1.1, "url": "http://osvdb.org/80456" }, { "trust": 1.1, "url": "http://osvdb.org/80457" }, { "trust": 1.1, "url": "http://osvdb.org/80458" }, { "trust": 1.1, "url": "http://osvdb.org/80459" }, { "trust": 1.1, "url": "http://osvdb.org/80460" }, { "trust": 1.1, "url": "http://osvdb.org/80461" }, { "trust": 1.1, "url": "http://osvdb.org/80467" }, { "trust": 1.1, "url": "http://osvdb.org/80468" }, { "trust": 1.1, "url": "http://osvdb.org/80469" }, { "trust": 1.1, "url": "http://osvdb.org/80470" }, { "trust": 1.1, "url": "http://osvdb.org/80471" }, { "trust": 1.1, "url": "http://osvdb.org/80472" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1443" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1443" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19198" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2012/mar/88" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1419" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1439" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1426" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1429" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1436" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1440" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1432" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1438" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1428" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1446" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1443" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1444" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1441" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1421" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1430" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1434" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1435" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1424" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1431" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1425" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1423" }, { "trust": 0.1, "url": "http://www.ieee-security.org/tc/sp2012/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1442" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1422" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1433" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1420" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1445" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1437" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54724" }, { "db": "BID", "id": "52612" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "CNNVD", "id": "CNNVD-201203-407" }, { "db": "NVD", "id": "CVE-2012-1443" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54724" }, { "db": "BID", "id": "52612" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "CNNVD", "id": "CNNVD-201203-407" }, { "db": "NVD", "id": "CVE-2012-1443" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54724" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52612" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "date": "2012-03-19T23:51:01", "db": "PACKETSTORM", "id": "110990" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-407" }, { "date": "2012-03-21T10:11:48.083000", "db": "NVD", "id": "CVE-2012-1443" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-11-06T00:00:00", "db": "VULHUB", "id": "VHN-54724" }, { "date": "2015-03-19T08:41:00", "db": "BID", "id": "52612" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "date": "2012-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-407" }, { "date": "2024-11-21T01:36:59.753000", "db": "NVD", "id": "CVE-2012-1443" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-407" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products RAR Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001895" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-407" } ], "trust": 0.6 } }
cve-2023-3160
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.eset.com/en/ca8466 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:48:07.675Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.eset.com/en/ca8466" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3160", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T20:03:59.300075Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T20:04:15.607Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET NOD32 Antivirus", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Internet Security", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Smart Security Premium", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Endpoint Antivirus", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Endpoint Security", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Server Security for Windows Server (File Security)", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Mail Security for Microsoft Exchange Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Mail Security for IBM Domino", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Security for Microsoft SharePoint Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nThe vulnerability potentially allows an attacker to misuse ESET\u2019s file operations during the module update to delete or move files without having proper permissions." } ], "value": "\nThe vulnerability potentially allows an attacker to misuse ESET\u2019s file operations during the module update to delete or move files without having proper permissions." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-14T09:27:02.427Z", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "url": "https://support.eset.com/en/ca8466" } ], "source": { "advisory": "ca8466", "discovery": "EXTERNAL" }, "title": "Local privilege escalation in security products for Windows", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2023-3160", "datePublished": "2023-08-14T09:27:02.427Z", "dateReserved": "2023-06-08T08:28:28.513Z", "dateUpdated": "2024-10-09T20:04:15.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-3779
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.eset.com/en/ca8688 |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ESET s.r.o | ESET NOD32 Antivirus |
Version: 0 < |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3779", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T13:10:29.360811Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-16T13:10:35.421Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:20:01.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.eset.com/en/ca8688" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ESET NOD32 Antivirus", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "17.1.13.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Internet Security", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "17.1.13.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Smart Security Premium", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "17.1.13.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Security Ultimate", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "17.1.13.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Endpoint Antivirus for Windows", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "11.0.2044.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Endpoint Security for Windows", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "11.0.2044.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Server Security for Windows Server", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "11.0.12011.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Mail Security for Microsoft Exchange Server", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "11.0.10005.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Mail Security for IBM Domino", "vendor": "ESET s.r.o", "versions": [ { "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Security for Microsoft SharePoint Server", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "11.0.15002.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2024-07-12T10:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\u2019s security product inoperable, provided non-default preconditions were met." } ], "value": "Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\u2019s security product inoperable, provided non-default preconditions were met." } ], "impacts": [ { "capecId": "CAPEC-578", "descriptions": [ { "lang": "en", "value": "CAPEC-578 Disable Security Software" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-16T08:17:59.962Z", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "url": "https://support.eset.com/en/ca8688" } ], "source": { "advisory": "ca8688", "discovery": "UNKNOWN" }, "title": "Denial of Service in ESET products for Windows", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2024-3779", "datePublished": "2024-07-16T08:17:59.962Z", "dateReserved": "2024-04-15T07:03:57.841Z", "dateUpdated": "2024-08-01T20:20:01.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8841
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/136082/ESET-NOD32-Heap-Overflow.html | x_refsource_MISC | |
http://www.virusradar.com/en/update/info/11861 | x_refsource_CONFIRM | |
https://bugs.chromium.org/p/project-zero/issues/detail?id=466 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:29:22.058Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/136082/ESET-NOD32-Heap-Overflow.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.virusradar.com/en/update/info/11861" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=466" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the Archive support module in ESET NOD32 before update 11861 allows remote attackers to execute arbitrary code via a large number of languages in an EPOC installation file of type SIS_FILE_MULTILANG." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-04-08T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/136082/ESET-NOD32-Heap-Overflow.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.virusradar.com/en/update/info/11861" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=466" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8841", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the Archive support module in ESET NOD32 before update 11861 allows remote attackers to execute arbitrary code via a large number of languages in an EPOC installation file of type SIS_FILE_MULTILANG." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/136082/ESET-NOD32-Heap-Overflow.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/136082/ESET-NOD32-Heap-Overflow.html" }, { "name": "http://www.virusradar.com/en/update/info/11861", "refsource": "CONFIRM", "url": "http://www.virusradar.com/en/update/info/11861" }, { "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=466", "refsource": "MISC", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=466" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8841", "datePublished": "2016-04-08T16:00:00Z", "dateReserved": "2016-04-08T00:00:00Z", "dateUpdated": "2024-09-17T00:21:24.524Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }