First published: Wed Mar 21 2012(Updated: )
The CAB file parser in Emsisoft Anti-Malware 5.1.0.1, Sophos Anti-Virus 4.61.0, and Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0 allows remote attackers to bypass malware detection via a CAB file with a modified reserved3 field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Emsisoft Anti-Malware | =5.1.0.1 | |
Ikarus Ikarus Virus Utilities T3 Command Line Scanner | =1.1.97.0 | |
Sophos Anti-Virus | =4.61.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1450 is considered a critical vulnerability as it allows remote attackers to bypass malware detection.
To fix CVE-2012-1450, update Emsisoft Anti-Malware, Sophos Anti-Virus, or Ikarus Virus Utilities to the latest version that addresses this vulnerability.
CVE-2012-1450 affects Emsisoft Anti-Malware version 5.1.0.1, Sophos Anti-Virus version 4.61.0, and Ikarus Virus Utilities T3 Command Line Scanner version 1.1.97.0.
Yes, CVE-2012-1450 can be exploited remotely by sending a specially crafted CAB file.
CVE-2012-1450 is associated with attacks that involve bypassing antivirus software by using modified CAB files.