The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, F-Secure Anti-Virus 9.0.16160.0, Sophos Anti-Virus 4.61.0, Antiy Labs AVL SDK 2.0.3.7, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified class field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
2012-03-21T10:11:48.037
2025-04-11T00:51:21.963
Deferred
CVSSv2: 4.3 (MEDIUM)
AV:N/AC:M/Au:N/C:N/I:P/A:N
8.6
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | aladdin | esafe | 7.0.17.0 | Yes |
Application | antiy | avl_sdk | 2.0.3.7 | Yes |
Application | cat | quick_heal | 11.00 | Yes |
Application | f-secure | f-secure_anti-virus | 9.0.16160.0 | Yes |
Application | fortinet | fortinet_antivirus | 4.2.254.0 | Yes |
Application | kaspersky | kaspersky_anti-virus | 7.0.0.125 | Yes |
Application | mcafee | gateway | 2010.1c | Yes |
Application | mcafee | scan_engine | 5.400.0.1158 | Yes |
Application | pandasecurity | panda_antivirus | 10.0.2.7 | Yes |
Application | rising-global | rising_antivirus | 22.83.00.03 | Yes |
Application | sophos | sophos_anti-virus | 4.61.0 | Yes |