First published: Wed Mar 21 2012(Updated: )
The Gzip file parser in Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with stray bytes at the end. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Aladdin eSafe | =7.0.17.0 | |
VirusBlokAda VBA32 | =3.12.14.2 | |
Antiy AVL SDK | =2.0.3.7 | |
Authentium Command Antivirus | =5.2.11.5 | |
QuickHeal CAT QuickHeal | =11.00 | |
F-PROT Antivirus | =4.6.2.117 | |
Jiangmin Jiangmin Antivirus | =13.0.900 | |
K7 Computing AntiVirus | =9.77.3565 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1460 has a moderate severity level, allowing attackers to bypass malware detection.
CVE-2012-1460 exploits vulnerabilities in the Gzip file parser of various antivirus software to avoid detection of malicious files.
CVE-2012-1460 affects several antivirus products including Quick Heal, F-Prot, and Antiy Labs AVL SDK.
To address CVE-2012-1460, update the affected antivirus software to the latest version that patches this vulnerability.
Yes, CVE-2012-1460 is specifically related to the exploitation of .tar.gz files to bypass malware detection.