Vulnerability Name:

CVE-2012-1442 (CCN-74258)

Assigned:2012-03-19
Published:2012-03-19
Updated:2012-07-28
Summary:The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, F-Secure Anti-Virus 9.0.16160.0, Sophos Anti-Virus 4.61.0, Antiy Labs AVL SDK 2.0.3.7, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified class field.
Note: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.5 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.5 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: BugTraq Mailing List, Sun Mar 18 2012
Evasion attacks expoliting file-parsing vulnerabilities in antivirus products

Source: MITRE
Type: CNA
CVE-2012-1442

Source: OSVDB
Type: UNKNOWN
80426

Source: OSVDB
Type: UNKNOWN
80427

Source: OSVDB
Type: UNKNOWN
80428

Source: CCN
Type: Antiy Labs Web Site
Antiy Labs Antivirus

Source: CCN
Type: F-secure Web Site
F-secure Antivirus

Source: CCN
Type: Fortinet Web Site
Fortinet Antivirus

Source: MISC
Type: UNKNOWN
http://www.ieee-security.org/TC/SP2012/program.html

Source: CCN
Type: Kaspersky Web Site
Kaspersky Antivirus

Source: CCN
Type: McAfee Web Site
McAfee Antivirus

Source: CCN
Type: OSVDB ID: 80426
Quick Heal Malformed ELF File Handling Scan Bypass

Source: CCN
Type: OSVDB ID: 80427
Kaspersky Anti-Virus Malformed ELF File Handling Scan Bypass

Source: CCN
Type: OSVDB ID: 80428
Antiy Labs AVL SDK Malformed ELF File Handling Scan Bypass

Source: CCN
Type: Panda Web Site
Panda Antivirus

Source: CCN
Type: Quick Heal Web Site
Quick Heal Antivirus

Source: CCN
Type: Rising Web Site
Rising Antivirus

Source: CCN
Type: eSafe Web Site
SafeNet eSafe Antivirus

Source: BUGTRAQ
Type: UNKNOWN
20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products

Source: BID
Type: UNKNOWN
52598

Source: CCN
Type: BID-52598
Multiple AntiVirus Products CVE-2012-1442 ELF File Scan Evasion Vulnerability

Source: CCN
Type: Sophos Web Site
Sophos Anti-virus

Source: XF
Type: UNKNOWN
multiple-av-elf-class-evasion(74258)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*
  • OR cpe:/a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*
  • OR cpe:/a:cat:quick_heal:11.00:*:*:*:*:*:*:*
  • OR cpe:/a:f-secure:f-secure_anti-virus:9.0.16160.0:*:*:*:*:*:*:*
  • OR cpe:/a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*
  • OR cpe:/a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*
  • OR cpe:/a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*
  • OR cpe:/a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*
  • OR cpe:/a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*
  • OR cpe:/a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*
  • OR cpe:/a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    aladdin esafe 7.0.17.0
    antiy avl sdk 2.0.3.7
    cat quick heal 11.00
    f-secure f-secure anti-virus 9.0.16160.0
    fortinet fortinet antivirus 4.2.254.0
    kaspersky kaspersky anti-virus 7.0.0.125
    mcafee gateway 2010.1c
    mcafee scan engine 5.400.0.1158
    pandasecurity panda antivirus 10.0.2.7
    rising-global rising antivirus 22.83.00.03
    sophos sophos anti-virus 4.61.0
    fortinet fortinet antivirus 4.2.254.0
    sophos sophos anti-virus 4.61.0