CVE-2012-1443 : Detail

CVE-2012-1443

A01-Broken Access Control
97.46%V3
Network
2012-03-21
09h00 +00:00
2012-07-28
07h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-264 Category : Permissions, Privileges, and Access Controls
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Ahnlab>>V3_internet_security >> Version 2011.01.18.00

    Aladdin>>Esafe >> Version 7.0.17.0

      Alwil>>Avast_antivirus >> Version 4.8.1351.0

        Alwil>>Avast_antivirus >> Version 5.0.677.0

          Anti-virus>>Vba32 >> Version 3.12.14.2

            Antiy>>Avl_sdk >> Version 2.0.3.7

              Authentium>>Command_antivirus >> Version 5.2.11.5

              Avg>>Avg_anti-virus >> Version 10.0.0.1190

                Avira>>Antivir >> Version 7.11.1.163

                  Bitdefender>>Bitdefender >> Version 7.2

                    Cat>>Quick_heal >> Version 11.00

                    Clamav>>Clamav >> Version 0.96.4

                    Comodo>>Comodo_antivirus >> Version 7424

                      Emsisoft>>Anti-malware >> Version 5.1.0.1

                        Eset>>Nod32_antivirus >> Version 5795

                          F-prot>>F-prot_antivirus >> Version 4.6.2.117

                          F-secure>>F-secure_anti-virus >> Version 9.0.16160.0

                            Fortinet>>Fortinet_antivirus >> Version 4.2.254.0

                              Gdata-software>>G_data_antivirus >> Version 21

                                Ikarus>>Ikarus_virus_utilities_t3_command_line_scanner >> Version 1.1.97.0

                                  Jiangmin>>Jiangmin_antivirus >> Version 13.0.900

                                    K7computing>>Antivirus >> Version 9.77.3565

                                    Kaspersky>>Kaspersky_anti-virus >> Version 7.0.0.125

                                      Mcafee>>Gateway >> Version 2010.1c

                                        Mcafee>>Scan_engine >> Version 5.400.0.1158

                                          Microsoft>>Security_essentials >> Version 2.0

                                            Norman>>Norman_antivirus_\&_antispyware >> Version 6.06.12

                                            Nprotect>>Nprotect_antivirus >> Version 2011-01-17.01

                                              Pandasecurity>>Panda_antivirus >> Version 10.0.2.7

                                                Pc_tools>>Pc_tools_antivirus >> Version 7.0.3.5

                                                  Rising-global>>Rising_antivirus >> Version 22.83.00.03

                                                  Sophos>>Sophos_anti-virus >> Version 4.61.0

                                                  Symantec>>Endpoint_protection >> Version 11.0

                                                  Trendmicro>>Housecall >> Version 9.120.0.1004

                                                    Trendmicro>>Trend_micro_antivirus >> Version 9.120.0.1004

                                                      Virusbuster>>Virusbuster >> Version 13.6.151.0

                                                        References

                                                        http://osvdb.org/80472
                                                        Tags : vdb-entry, x_refsource_OSVDB
                                                        http://www.securityfocus.com/archive/1/522005
                                                        Tags : mailing-list, x_refsource_BUGTRAQ
                                                        http://www.securityfocus.com/bid/52612
                                                        Tags : vdb-entry, x_refsource_BID
                                                        http://osvdb.org/80467
                                                        Tags : vdb-entry, x_refsource_OSVDB
                                                        http://osvdb.org/80461
                                                        Tags : vdb-entry, x_refsource_OSVDB
                                                        http://osvdb.org/80470
                                                        Tags : vdb-entry, x_refsource_OSVDB
                                                        http://osvdb.org/80460
                                                        Tags : vdb-entry, x_refsource_OSVDB
                                                        http://osvdb.org/80468
                                                        Tags : vdb-entry, x_refsource_OSVDB
                                                        http://osvdb.org/80456
                                                        Tags : vdb-entry, x_refsource_OSVDB
                                                        http://osvdb.org/80457
                                                        Tags : vdb-entry, x_refsource_OSVDB
                                                        http://osvdb.org/80458
                                                        Tags : vdb-entry, x_refsource_OSVDB
                                                        http://osvdb.org/80454
                                                        Tags : vdb-entry, x_refsource_OSVDB
                                                        http://osvdb.org/80455
                                                        Tags : vdb-entry, x_refsource_OSVDB
                                                        http://osvdb.org/80459
                                                        Tags : vdb-entry, x_refsource_OSVDB
                                                        http://osvdb.org/80469
                                                        Tags : vdb-entry, x_refsource_OSVDB
                                                        http://osvdb.org/80471
                                                        Tags : vdb-entry, x_refsource_OSVDB