Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2012-1423


The TAR file parser in Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, K7 AntiVirus 9.77.3565, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.


Published

2012-03-21T10:11:47.317

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 4.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-264

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application authentium command_antivirus 5.2.11.5 Yes
Application emsisoft anti-malware 5.1.0.1 Yes
Application eset nod32_antivirus 5795 Yes
Application f-prot f-prot_antivirus 4.6.2.117 Yes
Application fortinet fortinet_antivirus 4.2.254.0 Yes
Application ikarus ikarus_virus_utilities_t3_command_line_scanner 1.1.97.0 Yes
Application k7computing antivirus 9.77.3565 Yes
Application norman norman_antivirus_\&_antispyware 6.06.12 Yes
Application pc_tools pc_tools_antivirus 7.0.3.5 Yes
Application rising-global rising_antivirus 22.83.00.03 Yes
Application virusbuster virusbuster 13.6.151.0 Yes

References