CVE-2012-1442

The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, F-Secure Anti-Virus 9.0.16160.0, Sophos Anti-Virus 4.61.0, Antiy Labs AVL SDK 2.0.3.7, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified class field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
Severity
UNKNOWN
AV:N/AC:M/Au:N/C:N/I:P/A:N
Atk. Vector
NETWORK
Atk. Complexity
MEDIUM
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
aladdinesafe
7.0.17.0
antiyavl_sdk
2.0.3.7
catquick_heal
11.00
f-securef-secure_anti-virus
9.0.16160.0
fortinetfortinet_antivirus
4.2.254.0
kasperskykaspersky_anti-virus
7.0.0.125
mcafeegateway
2010.1c
mcafeescan_engine
5.400.0.1158
pandasecuritypanda_antivirus
10.0.2.7
rising-globalrising_antivirus
22.83.00.03
sophossophos_anti-virus
4.61.0
𝑥
= Vulnerable software versions
Common Weakness Enumeration