First published: Mon Feb 24 2020(Updated: )
The Quick Heal AV parsing engine (November 2019) allows virus-detection bypass via a crafted GPFLAG in a ZIP archive. This affects Total Security, Home Security, Total Security Multi-Device, Internet Security, Total Security for Mac, AntiVirus Pro, AntiVirus for Server, and Total Security for Android.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Quickheal Antivirus For Server | =2019-11 | |
QuickHeal Antivirus Pro | =2019-11 | |
Quickheal Home Security | =2019-11 | |
Quickheal Internet Security | =2019-11 | |
Quickheal Total Security | =2019-11 | |
Quickheal Total Security | =2019-11 | |
Quickheal Total Security | =2019-11 | |
Quickheal Total Security Multi-device | =2019-11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-9362 is classified as medium, indicating a moderate risk of exploitation.
To fix CVE-2020-9362, users should update to the latest version of Quick Heal antivirus software that addresses this vulnerability.
CVE-2020-9362 affects various Quick Heal products, including Total Security, Home Security, and Antivirus Pro, all from the November 2019 version.
CVE-2020-9362 can potentially be exploited locally by an attacker who has access to upload crafted ZIP files.
The implications of CVE-2020-9362 include possible virus-detection bypass that can allow malware within crafted ZIP archives to evade detection.