First published: Wed Mar 21 2012(Updated: )
The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Antiy Avl Sdk | =2.0.3.7 | |
CA eTrust Vet Antivirus | =36.1.8511 | |
Drweb Dr.web Antivirus | =5.0.2.03300 | |
Emsisoft Anti-Malware | =5.1.0.1 | |
Fortinet Fortinet Antivirus | =4.2.254.0 | |
Ikarus Ikarus Virus Utilities T3 Command Line Scanner | =1.1.97.0 | |
Kaspersky Kaspersky Anti-virus | =7.0.0.125 | |
McAfee Gateway | =2010.1c | |
Microsoft Security Essentials | =2.0 | |
Pandasecurity Panda Antivirus | =10.0.2.7 | |
Rising-global Rising Antivirus | =22.83.00.03 | |
Sophos Sophos Anti-virus | =4.61.0 | |
Trendmicro Housecall | =9.120.0.1004 | |
Trendmicro Trend Micro Antivirus | =9.120.0.1004 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.