First published: Wed Mar 21 2012(Updated: )
The Microsoft CHM file parser in ClamAV 0.96.4 and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CHM parser implementations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ClamAV | =0.96.4 | |
Sophos Anti-Virus | =4.61.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1458 has a medium severity rating due to its potential for malware detection bypass.
To fix CVE-2012-1458, upgrade to a patched version of ClamAV or Sophos Anti-Virus that addresses this vulnerability.
CVE-2012-1458 affects ClamAV version 0.96.4 and Sophos Anti-Virus version 4.61.0.
Yes, CVE-2012-1458 can be exploited remotely by attackers using a specially crafted CHM file.
The vulnerability in CVE-2012-1458 allows malicious CHM files to bypass malware detection due to a crafted reset interval in the LZXC header.