First published: Wed Mar 21 2012(Updated: )
The CAB file parser in Quick Heal (aka Cat QuickHeal) 11.00, Trend Micro AntiVirus 9.120.0.1004, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Trend Micro HouseCall 9.120.0.1004, and Emsisoft Anti-Malware 5.1.0.1 allows remote attackers to bypass malware detection via a CAB file with a modified cbCabinet field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QuickHeal CAT QuickHeal | =11.00 | |
Emsisoft Anti-Malware | =5.1.0.1 | |
Ikarus Ikarus Virus Utilities T3 Command Line Scanner | =1.1.97.0 | |
Trend Micro HouseCall | =9.120.0.1004 | |
Trend Micro Antivirus | =9.120.0.1004 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1448 is classified as a medium severity vulnerability due to its potential to allow a bypass of malware detection methods.
Fixing CVE-2012-1448 involves updating the affected software to the latest version provided by the vendor.
CVE-2012-1448 affects Quick Heal 11.00, several versions of Trend Micro Antivirus and HouseCall, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Emsisoft Anti-Malware 5.1.0.1.
The exploit method for CVE-2012-1448 involves using a malicious CAB file to bypass malware detection in the affected antivirus software.
Yes, if exploited, CVE-2012-1448 can lead to a potential compromise of the system as it allows malware to evade detection.