Vulnerability Name:

CVE-2012-1460 (CCN-74308)

Assigned:2012-03-19
Published:2012-03-19
Updated:2017-08-29
Summary:The Gzip file parser in Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with stray bytes at the end.
Note: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.5 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.5 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: VirusBlokAda Web Site
VirusBlokAda VBA32 Antivirus

Source: CCN
Type: BugTraq Mailing List, Sun Mar 18 2012
Evasion attacks expoliting file-parsing vulnerabilities in antivirus products

Source: MITRE
Type: CNA
CVE-2012-1460

Source: CCN
Type: Jiangmin Web Site
Jiangmin Antivirus

Source: CCN
Type: Antiy Labs Web Site
Antiy AVL Antivirus

Source: CCN
Type: Command Web Site
Command Antivirus

Source: CCN
Type: F-Prot Web Site
F-Prot Antivirus

Source: MISC
Type: UNKNOWN
http://www.ieee-security.org/TC/SP2012/program.html

Source: CCN
Type: K7 Web Site
K7 Antivirus

Source: CCN
Type: OSVDB ID: 80490
Antiy Labs AVL SDK Malformed TGZ File Handling Scan Bypass

Source: CCN
Type: OSVDB ID: 80491
Quick Heal Malformed TGZ File Handling Scan Bypass

Source: CCN
Type: OSVDB ID: 80492
Command Antivirus Malformed TGZ File Handling Scan Bypass

Source: CCN
Type: OSVDB ID: 80493
eSafe Malformed TGZ File Handling Scan Bypass

Source: CCN
Type: OSVDB ID: 80494
F-Prot Antivirus Malformed TGZ File Handling Scan Bypass

Source: CCN
Type: OSVDB ID: 80495
Jiangmin Antivirus Malformed TGZ File Handling Scan Bypass

Source: CCN
Type: OSVDB ID: 80496
K7 AntiVirus Malformed TGZ File Handling Scan Bypass

Source: CCN
Type: OSVDB ID: 80497
VBA32 Malformed TGZ File Handling Scan Bypass

Source: CCN
Type: Quick Heal Web Site
Quick Heal Antivirus

Source: CCN
Type: eSafe Web Site
SafeNet eSafe Antivirus

Source: BUGTRAQ
Type: UNKNOWN
20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products

Source: BID
Type: UNKNOWN
52629

Source: CCN
Type: BID-52629
Multiple AntiVirus Products CVE-2012-1460 'tar.gz' File Scan Evasion Vulnerability

Source: XF
Type: UNKNOWN
multiple-av-tar-gzip-evasion(74308)

Source: XF
Type: UNKNOWN
multiple-av-tar-gzip-evasion(74308)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*
  • OR cpe:/a:anti-virus:vba32:3.12.14.2:*:*:*:*:*:*:*
  • OR cpe:/a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*
  • OR cpe:/a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*
  • OR cpe:/a:cat:quick_heal:11.00:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*
  • OR cpe:/a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*
  • OR cpe:/a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*
  • OR cpe:/a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    aladdin esafe 7.0.17.0
    anti-virus vba32 3.12.14.2
    antiy avl sdk 2.0.3.7
    authentium command antivirus 5.2.11.5
    cat quick heal 11.00
    f-prot f-prot antivirus 4.6.2.117
    jiangmin jiangmin antivirus 13.0.900
    k7computing antivirus 9.77.3565
    f-prot f-prot antivirus 4.6.2.117
    jiangmin jiangmin antivirus 13.0.900