First published: Wed Mar 21 2012(Updated: )
The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \50\4B\4C\49\54\45 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AhnLab V3 Internet Security | =2011.01.18.00 | |
Aladdin eSafe | =7.0.17.0 | |
Emsisoft Anti-Malware | =5.1.0.1 | |
Ikarus Ikarus Virus Utilities T3 Command Line Scanner | =1.1.97.0 | |
Panda Security | =10.0.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1435 is classified as a medium severity vulnerability due to its ability to allow remote attackers to bypass malware detection.
To remediate CVE-2012-1435, it is recommended to update the affected software to a version that addresses this vulnerability.
CVE-2012-1435 affects AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7.
Systems vulnerable to CVE-2012-1435 may exhibit an inability to detect certain malicious EXE files.
Currently, the best practice is to upgrade to the latest versions of the affected antivirus software to mitigate CVE-2012-1435.