First published: Wed Mar 21 2012(Updated: )
The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AhnLab V3 Internet Security | =2011.01.18.00 | |
Aladdin eSafe | =7.0.17.0 | |
Emsisoft Anti-Malware | =5.1.0.1 | |
Ikarus Virus Utilities T3 Command Line Scanner | =1.1.97.0 | |
Panda Security | =10.0.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1433 is considered medium severity as it allows remote attackers to bypass malware detection.
CVE-2012-1433 affects AhnLab V3 Internet Security 2011.01.18.00 by enabling detection bypass through specially crafted EXE files.
CVE-2012-1433 impacts AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7.
To mitigate CVE-2012-1433, update the affected antivirus software to the latest versions or apply the vendor's patches.
CVE-2012-1433 can be exploited by uploading specially crafted EXE files that may evade detection by the mentioned anti-malware solutions.