First published: Wed Mar 21 2012(Updated: )
The TAR file parser in Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, K7 AntiVirus 9.77.3565, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Authentium Command Antivirus | =5.2.11.5 | |
Emsisoft Anti-Malware | =5.1.0.1 | |
ESET NOD32 Antivirus | =5795 | |
F-PROT Antivirus | =4.6.2.117 | |
Fortinet Antivirus | =4.2.254.0 | |
Ikarus Virus Utilities T3 Command Line Scanner | =1.1.97.0 | |
K7 Computing AntiVirus | =9.77.3565 | |
Norman Antivirus & Antispyware | =6.06.12 | |
PC Tools Antivirus | =7.0.3.5 | |
Rising Antivirus | =22.83.00.03 | |
VirusBuster | =13.6.151.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1423 is rated as a high severity vulnerability due to potential exploitation leading to arbitrary code execution.
To fix CVE-2012-1423, update your antivirus software to the latest version that addresses this vulnerability.
Affected software includes Command Antivirus, Emsisoft Anti-Malware, F-Prot Antivirus, Fortinet Antivirus, and several others.
CVE-2012-1423 is a vulnerability in the TAR file parser, which may allow attackers to execute arbitrary code.
Yes, CVE-2012-1423 can potentially be exploited remotely if the vulnerable antivirus software processes a malicious TAR file.