CVE-2012-1442

The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, F-Secure Anti-Virus 9.0.16160.0, Sophos Anti-Virus 4.61.0, Antiy Labs AVL SDK 2.0.3.7, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified class field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
VendorProductVersion
aladdinesafe
7.0.17.0
antiyavl_sdk
2.0.3.7
catquick_heal
11.00
f-securef-secure_anti-virus
9.0.16160.0
fortinetfortinet_antivirus
4.2.254.0
kasperskykaspersky_anti-virus
7.0.0.125
mcafeegateway
2010.1c:c
mcafeescan_engine
5.400.0.1158
pandasecuritypanda_antivirus
10.0.2.7
rising-globalrising_antivirus
22.83.00.03
sophossophos_anti-virus
4.61.0
𝑥
= Vulnerable software versions
Common Weakness Enumeration