ID

VAR-201203-0381


CVE

CVE-2012-1457


TITLE

Multiple products TAR Vulnerability that prevents file parsers from detecting malware

Trust: 0.8

sources: JVNDB: JVNDB-2012-001902

DESCRIPTION

The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By a third party TAR Total file size exceeded length With field TAR Malware detection can be bypassed via archive entries. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Vulnerabilities exist in the TAR file parser in version 1004, Trend Micro HouseCall version 9.120.0.1004, VBA32 version 3.12.14.2, and VirusBuster version 13.6.151.0. ============================================================================ Ubuntu Security Notice USN-1482-1 June 19, 2012 clamav vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS - Ubuntu 11.10 - Ubuntu 11.04 - Ubuntu 10.04 LTS Summary: ClamAV could improperly detect malware if it opened a specially crafted file. Software Description: - clamav: Anti-virus utility for Unix Details: It was discovered that ClamAV incorrectly handled certain malformed TAR archives. (CVE-2012-1457, CVE-2012-1459) It was discovered that ClamAV incorrectly handled certain malformed CHM files. (CVE-2012-1458) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: clamav 0.97.5+dfsg-1ubuntu0.12.04.1 clamav-daemon 0.97.5+dfsg-1ubuntu0.12.04.1 libclamav6 0.97.5+dfsg-1ubuntu0.12.04.1 Ubuntu 11.10: clamav 0.97.5+dfsg-1ubuntu0.11.10.1 clamav-daemon 0.97.5+dfsg-1ubuntu0.11.10.1 libclamav6 0.97.5+dfsg-1ubuntu0.11.10.1 Ubuntu 11.04: clamav 0.97.5+dfsg-1ubuntu0.11.04.1 clamav-daemon 0.97.5+dfsg-1ubuntu0.11.04.1 libclamav6 0.97.5+dfsg-1ubuntu0.11.04.1 Ubuntu 10.04 LTS: clamav 0.96.5+dfsg-1ubuntu1.10.04.4 clamav-daemon 0.96.5+dfsg-1ubuntu1.10.04.4 libclamav6 0.96.5+dfsg-1ubuntu1.10.04.4 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1482-1 CVE-2012-1457, CVE-2012-1458, CVE-2012-1459 Package Information: https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.1 https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.1 https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.1 https://launchpad.net/ubuntu/+source/clamav/0.96.5+dfsg-1ubuntu1.10.04.4 . The Microsoft CHM file parser in ClamAV 0.96.4 allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459 http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=clamav-0.97.5 _______________________________________________________________________ Updated Packages: Mandriva Enterprise Server 5: d82d78601290e2f6073974170c81841a mes5/i586/clamav-0.97.5-0.1mdvmes5.2.i586.rpm 80f0475472c0217afd3727019bf27e53 mes5/i586/clamav-db-0.97.5-0.1mdvmes5.2.i586.rpm c13835eadea8d2af15b628fba3159e8b mes5/i586/clamav-milter-0.97.5-0.1mdvmes5.2.i586.rpm d7c058fae32f1a081b1d4ca31157df0e mes5/i586/clamd-0.97.5-0.1mdvmes5.2.i586.rpm 5ad153709c7eb510c2be2e82bfa5ac52 mes5/i586/libclamav6-0.97.5-0.1mdvmes5.2.i586.rpm 96e3d3f3e9bea802c4109c155c9d1465 mes5/i586/libclamav-devel-0.97.5-0.1mdvmes5.2.i586.rpm 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: b30f5aafd9aaff0a7743fb62f33ccbea mes5/x86_64/clamav-0.97.5-0.1mdvmes5.2.x86_64.rpm 1508801239427c0ac72734f52cb4451c mes5/x86_64/clamav-db-0.97.5-0.1mdvmes5.2.x86_64.rpm 92b4c5ca6db656801b5b6ae217c6e171 mes5/x86_64/clamav-milter-0.97.5-0.1mdvmes5.2.x86_64.rpm 94fad12df2cc900309087bbda13c826a mes5/x86_64/clamd-0.97.5-0.1mdvmes5.2.x86_64.rpm 8ec166a457d0512479adaaf5f80d487f mes5/x86_64/lib64clamav6-0.97.5-0.1mdvmes5.2.x86_64.rpm 19bc2758175bcde28ebf7783d68a9b98 mes5/x86_64/lib64clamav-devel-0.97.5-0.1mdvmes5.2.x86_64.rpm 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iD8DBQFP3tnKmqjQ0CJFipgRAj4wAJ9eURS1mZYCZhkmUTVE/U8QAH47MwCgxQzf OUr1QL5Wsvt3KboLKCdYUhE= =1QL7 -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2012-1457 // JVNDB: JVNDB-2012-001902 // BID: 52610 // VULHUB: VHN-54738 // PACKETSTORM: 113878 // PACKETSTORM: 113841

AFFECTED PRODUCTS

vendor:virusbustermodel:virusbusterscope:eqversion:13.6.151.0

Trust: 2.4

vendor:antiymodel:avl sdkscope:eqversion:2.0.3.7

Trust: 1.8

vendor:authentiummodel:command antivirusscope:eqversion:5.2.11.5

Trust: 1.8

vendor:avgmodel:anti-virusscope:eqversion:10.0.0.1190

Trust: 1.8

vendor:bitdefendermodel:bitdefenderscope:eqversion:7.2

Trust: 1.8

vendor:clamavmodel:clamavscope:eqversion:0.96.4

Trust: 1.8

vendor:emsisoftmodel:anti-malwarescope:eqversion:5.1.0.1

Trust: 1.8

vendor:ikarusmodel:virus utilities t3 command line scannerscope:eqversion:1.1.97.0

Trust: 1.8

vendor:jiangminmodel:antivirusscope:eqversion:13.0.900

Trust: 1.8

vendor:pc toolsmodel:antivirusscope:eqversion:7.0.3.5

Trust: 1.8

vendor:aladdinmodel:esafescope:eqversion:7.0.17.0

Trust: 1.8

vendor:kasperskymodel:anti-virusscope:eqversion:7.0.0.125

Trust: 1.8

vendor:microsoftmodel:security essentialsscope:eqversion:2.0

Trust: 1.8

vendor:mcafeemodel:scan enginescope:eqversion:5.400.0.1158

Trust: 1.8

vendor:alwilmodel:avast antivirusscope:eqversion:5.0.677.0

Trust: 1.0

vendor:alwilmodel:avast antivirusscope:eqversion:4.8.1351.0

Trust: 1.0

vendor:trendmicromodel:trend micro antivirusscope:eqversion:9.120.0.1004

Trust: 1.0

vendor:gdatamodel:g data antivirusscope:eqversion:21

Trust: 1.0

vendor:rising globalmodel:antivirusscope:eqversion:22.83.00.03

Trust: 1.0

vendor:k7computingmodel:antivirusscope:eqversion:9.77.3565

Trust: 1.0

vendor:esetmodel:nod32 antivirusscope:eqversion:5795

Trust: 1.0

vendor:anti virusmodel:vba32scope:eqversion:3.12.14.2

Trust: 1.0

vendor:symantecmodel:endpoint protectionscope:eqversion:11.0

Trust: 1.0

vendor:trendmicromodel:housecallscope:eqversion:9.120.0.1004

Trust: 1.0

vendor:mcafeemodel:gatewayscope:eqversion:2010.1c

Trust: 1.0

vendor:normanmodel:antivirus \& antispywarescope:eqversion:6.06.12

Trust: 1.0

vendor:catmodel:quick healscope:eqversion:11.00

Trust: 1.0

vendor:f protmodel:f-prot antivirusscope:eqversion:4.6.2.117

Trust: 1.0

vendor:aviramodel:antivirscope:eqversion:7.11.1.163

Trust: 1.0

vendor:avast s r omodel:anti-virusscope:eqversion:4.8.1351.0

Trust: 0.8

vendor:avast s r omodel:anti-virusscope:eqversion:5.0.677.0

Trust: 0.8

vendor:aviramodel:antivirusscope:eqversion:7.11.1.163

Trust: 0.8

vendor:risingmodel:antivirusscope:eqversion:22.83.00.03

Trust: 0.8

vendor:esetmodel:nod32 anti-virusscope:eqversion:5795

Trust: 0.8

vendor:friskmodel:f-prot antivirusscope:eqversion:4.6.2.117

Trust: 0.8

vendor:g datamodel:antivirusscope:eqversion:21

Trust: 0.8

vendor:k7 computingmodel:antivirusscope:eqversion:9.77.3565

Trust: 0.8

vendor:normanmodel:antivirusscope:eqversion:6.06.12

Trust: 0.8

vendor:virusblokadamodel:vba32scope:eqversion:3.12.14.2

Trust: 0.8

vendor:quick heal k kmodel:healscope:eqversion:11.00

Trust: 0.8

vendor:symantecmodel:endpoint protectionscope:eqversion:11

Trust: 0.8

vendor:trend micromodel:antivirusscope:eqversion:9.120.0.1004

Trust: 0.8

vendor:trend micromodel:housecallscope:eqversion:9.120.0.1004

Trust: 0.8

vendor:mcafeemodel:web gateway softwarescope:eqversion:2010.1c

Trust: 0.8

vendor:virusblokadamodel:vba32scope:eqversion:3.12.142

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.10

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:11.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:11.04

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.04

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:trend micromodel:virusbusterscope:eqversion:13.6.1510

Trust: 0.3

vendor:trend micromodel:trend microscope:eqversion:9.1201004

Trust: 0.3

vendor:trend micromodel:housecallscope:eqversion:9.1201004

Trust: 0.3

vendor:symantecmodel:antivirusscope:eqversion:20101.3103

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:12.1

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:risingmodel:antivirusscope:eqversion:22.8303

Trust: 0.3

vendor:quick healmodel:cat-quickhealscope:eqversion:11.00

Trust: 0.3

vendor:pctoolsmodel:antivirusscope:eqversion:7.0.35

Trust: 0.3

vendor:normanmodel:antivirusscope:eqversion:6.6.12

Trust: 0.3

vendor:microsoftmodel:antivirusscope:eqversion:1.6402

Trust: 0.3

vendor:mcafeemodel:mcafee-gw-edition 2010.1cscope: - version: -

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:kasperskymodel:antivirusscope:eqversion:7.0125

Trust: 0.3

vendor:k7model:computing pvt ltd k7antivirusscope:eqversion:9.77.3565

Trust: 0.3

vendor:jiangminmodel:jiangminscope:eqversion:13.0.900

Trust: 0.3

vendor:ikarusmodel:antivirus t3.1.1.97.0scope: - version: -

Trust: 0.3

vendor:gmodel:data software gdatascope:eqversion:21

Trust: 0.3

vendor:friskmodel:software f-prot antivirusscope:eqversion:4.6.2117

Trust: 0.3

vendor:esetmodel:nod32scope:eqversion:5795

Trust: 0.3

vendor:esafemodel:antivirusscope:eqversion:7.0.170

Trust: 0.3

vendor:emsisoftmodel:antivirusscope:eqversion:5.11

Trust: 0.3

vendor:bitdefendermodel:antivirusscope:eqversion:7.2

Trust: 0.3

vendor:aviramodel:antivir enginescope:eqversion:7.11.1163

Trust: 0.3

vendor:avgmodel:anti-virusscope:eqversion:10.01190

Trust: 0.3

vendor:avastmodel:avast5 antivirusscope:eqversion:5.0.6770

Trust: 0.3

vendor:avastmodel:antivirusscope:eqversion:4.8.1351.0

Trust: 0.3

vendor:authentiummodel:command antivirusscope:eqversion:5.2.115

Trust: 0.3

vendor:antiymodel:antiy-avlscope:eqversion:2.0.37

Trust: 0.3

sources: BID: 52610 // JVNDB: JVNDB-2012-001902 // CNNVD: CNNVD-201203-420 // NVD: CVE-2012-1457

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-1457
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-1457
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201203-420
value: MEDIUM

Trust: 0.6

VULHUB: VHN-54738
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-1457
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-54738
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-54738 // JVNDB: JVNDB-2012-001902 // CNNVD: CNNVD-201203-420 // NVD: CVE-2012-1457

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-54738 // JVNDB: JVNDB-2012-001902 // NVD: CVE-2012-1457

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 113878 // PACKETSTORM: 113841 // CNNVD: CNNVD-201203-420

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201203-420

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001902

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-54738

PATCH

title:Top Pageurl:http://www.aladdin.com/

Trust: 0.8

title:Top Pageurl:http://www.antiy.net/

Trust: 0.8

title:Top Pageurl:http://www.authentium.com/

Trust: 0.8

title:Top Pageurl:https://www.avast.com/index

Trust: 0.8

title:Top Pageurl:http://www.avg.com/

Trust: 0.8

title:Top Pageurl:http://www.avira.com/

Trust: 0.8

title:Top Pageurl:http://www.rising-global.com/

Trust: 0.8

title:Top Pageurl:http://www.bitdefender.com/

Trust: 0.8

title:Top Pageurl:http://www.clamav.net/

Trust: 0.8

title:Top Pageurl:http://www.emsisoft.com/

Trust: 0.8

title:Top Pageurl:http://www.eset.com/

Trust: 0.8

title:Top Pageurl:http://www.f-prot.com/

Trust: 0.8

title:Top Pageurl:http://www.gdata-software.com/

Trust: 0.8

title:Top Pageurl:http://www.ikarus.at/

Trust: 0.8

title:Top Pageurl:http://global.jiangmin.com/

Trust: 0.8

title:Top Pageurl:http://www.k7computing.com/

Trust: 0.8

title:Top Pageurl:http://www.mcafee.com/

Trust: 0.8

title:Top Pageurl:http://www.microsoft.com/

Trust: 0.8

title:Top Pageurl:http://www.norman.com/

Trust: 0.8

title:openSUSE-SU-2012:0833url:http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html

Trust: 0.8

title:Top Pageurl:http://www.pctools.com/

Trust: 0.8

title:Top Pageurl:http://www.quickheal.com/

Trust: 0.8

title:Top Pageurl:http://www.symantec.com/

Trust: 0.8

title:Top Pageurl:http://www.trendmicro.com/

Trust: 0.8

title:Top Pageurl:http://anti-virus.by/en/

Trust: 0.8

title:Top Pageurl:http://www.virusbuster.hu/en/

Trust: 0.8

title:Top Pageurl:http://www.kaspersky.com/

Trust: 0.8

sources: JVNDB: JVNDB-2012-001902

EXTERNAL IDS

db:NVDid:CVE-2012-1457

Trust: 3.0

db:BIDid:52610

Trust: 1.4

db:OSVDBid:80392

Trust: 1.1

db:OSVDBid:80406

Trust: 1.1

db:OSVDBid:80391

Trust: 1.1

db:OSVDBid:80407

Trust: 1.1

db:OSVDBid:80396

Trust: 1.1

db:OSVDBid:80395

Trust: 1.1

db:OSVDBid:80403

Trust: 1.1

db:OSVDBid:80409

Trust: 1.1

db:OSVDBid:80389

Trust: 1.1

db:OSVDBid:80393

Trust: 1.1

db:JVNDBid:JVNDB-2012-001902

Trust: 0.8

db:CNNVDid:CNNVD-201203-420

Trust: 0.7

db:BUGTRAQid:20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS

Trust: 0.6

db:NSFOCUSid:19229

Trust: 0.6

db:PACKETSTORMid:113841

Trust: 0.2

db:VULHUBid:VHN-54738

Trust: 0.1

db:PACKETSTORMid:113878

Trust: 0.1

sources: VULHUB: VHN-54738 // BID: 52610 // JVNDB: JVNDB-2012-001902 // PACKETSTORM: 113878 // PACKETSTORM: 113841 // CNNVD: CNNVD-201203-420 // NVD: CVE-2012-1457

REFERENCES

url:http://www.securityfocus.com/archive/1/522005

Trust: 1.7

url:http://www.ieee-security.org/tc/sp2012/program.html

Trust: 1.7

url:http://www.securityfocus.com/bid/52610

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2012:094

Trust: 1.1

url:http://osvdb.org/80389

Trust: 1.1

url:http://osvdb.org/80391

Trust: 1.1

url:http://osvdb.org/80392

Trust: 1.1

url:http://osvdb.org/80393

Trust: 1.1

url:http://osvdb.org/80395

Trust: 1.1

url:http://osvdb.org/80396

Trust: 1.1

url:http://osvdb.org/80403

Trust: 1.1

url:http://osvdb.org/80406

Trust: 1.1

url:http://osvdb.org/80407

Trust: 1.1

url:http://osvdb.org/80409

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/74293

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1457

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1457

Trust: 0.8

url:http://www.nsfocus.net/vulndb/19229

Trust: 0.6

url:http://www.antiy.net

Trust: 0.3

url:http://www.authentium.com

Trust: 0.3

url:http://www.avast.com

Trust: 0.3

url:http://www.avg.com

Trust: 0.3

url:http://www.avira.com/

Trust: 0.3

url:http://www.bitdefender.com

Trust: 0.3

url:http://www.emsisoft.com/en/software/antimalware/

Trust: 0.3

url:http://www.safenet-inc.com/data-protection/content-security-esafe/

Trust: 0.3

url:http://eset.com

Trust: 0.3

url:http://www.f-prot.com/

Trust: 0.3

url:http://www.gdatasoftware.com

Trust: 0.3

url:http://www.ikarus.at

Trust: 0.3

url:http://global.jiangmin.com/

Trust: 0.3

url:http://www.k7computing.com/en/product/k7-antivirusplus.php

Trust: 0.3

url:http://www.kaspersky.com/

Trust: 0.3

url:http://www.mcafee.com/

Trust: 0.3

url:http://www.microsoft.com

Trust: 0.3

url:http://anti-virus-software-review.toptenreviews.com/norman-review.html

Trust: 0.3

url:http://www.pctools.com/spyware-doctor-antivirus/

Trust: 0.3

url:http://www.quickheal.com/

Trust: 0.3

url:http://www.rising-global.com/

Trust: 0.3

url:http://www.symantec.com

Trust: 0.3

url:http://www.trend.com

Trust: 0.3

url:http://anti-virus.by/en/index.shtml

Trust: 0.3

url:/archive/1/522005

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2012-1457

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-1459

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-1458

Trust: 0.2

url:https://launchpad.net/ubuntu/+source/clamav/0.96.5+dfsg-1ubuntu1.10.04.4

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1482-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.1

Trust: 0.1

url:http://www.mandriva.com/security/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1459

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=changelog;hb=clamav-0.97.5

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1458

Trust: 0.1

sources: VULHUB: VHN-54738 // BID: 52610 // JVNDB: JVNDB-2012-001902 // PACKETSTORM: 113878 // PACKETSTORM: 113841 // CNNVD: CNNVD-201203-420 // NVD: CVE-2012-1457

CREDITS

Suman Jana and Vitaly Shmatikov

Trust: 0.3

sources: BID: 52610

SOURCES

db:VULHUBid:VHN-54738
db:BIDid:52610
db:JVNDBid:JVNDB-2012-001902
db:PACKETSTORMid:113878
db:PACKETSTORMid:113841
db:CNNVDid:CNNVD-201203-420
db:NVDid:CVE-2012-1457

LAST UPDATE DATE

2024-11-23T21:46:23.996000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-54738date:2018-01-18T00:00:00
db:BIDid:52610date:2015-05-07T17:17:00
db:JVNDBid:JVNDB-2012-001902date:2012-07-25T00:00:00
db:CNNVDid:CNNVD-201203-420date:2012-04-01T00:00:00
db:NVDid:CVE-2012-1457date:2024-11-21T01:37:01.753

SOURCES RELEASE DATE

db:VULHUBid:VHN-54738date:2012-03-21T00:00:00
db:BIDid:52610date:2012-03-20T00:00:00
db:JVNDBid:JVNDB-2012-001902date:2012-03-26T00:00:00
db:PACKETSTORMid:113878date:2012-06-20T02:54:11
db:PACKETSTORMid:113841date:2012-06-19T00:56:02
db:CNNVDid:CNNVD-201203-420date:2012-03-26T00:00:00
db:NVDid:CVE-2012-1457date:2012-03-21T10:11:49.287