First published: Wed Mar 21 2012(Updated: )
The CAB file parser in Emsisoft Anti-Malware 5.1.0.1 and Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0 allows remote attackers to bypass malware detection via a CAB file with a modified reserved2 field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Emsisoft Anti-Malware | =5.1.0.1 | |
Ikarus Ikarus Virus Utilities T3 Command Line Scanner | =1.1.97.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1451 is classified as a vulnerability that allows bypassing malware detection, but specific severity ratings may vary by organization.
To mitigate CVE-2012-1451, update Emsisoft Anti-Malware and Ikarus Virus Utilities to the latest versions that address this vulnerability.
CVE-2012-1451 affects Emsisoft Anti-Malware version 5.1.0.1 and Ikarus Virus Utilities T3 Command Line Scanner version 1.1.97.0.
Yes, CVE-2012-1451 can be exploited remotely through specially crafted CAB files.
CVE-2012-1451 facilitates a malware detection bypass attack through manipulation of the CAB file format.