CVE-2012-1443 (CNNVD-201203-407)

MEDIUM
中文标题:
多个杀毒产品RAR文件权限许可和访问控制漏洞
英文标题:
The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 1...
CVSS分数: 4.3
发布时间: 2012-03-21 10:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Sophos Anti-Virus是英国Sophos公司的一套适用于多种操作系统的反病毒软件。该软件可实时侦测和清除病毒、间谍软件、木马和蠕虫,确保台式机和笔记本电脑的全面网络保护。 ClamAV 0.96.4版本,Rising Antivirus 22.83.00.03版本,Quick Heal(也称Cat QuickHeal)11.00版本,G Data AntiVirus 21版本,Symantec Endpoint Protection 11中的AVEngine 20101.3.0.103版本,Command Antivirus 5.2.11.5版本,Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0版本,Emsisoft Anti-Malware 5.1.0.1版本,PC Tools AntiVirus 7.0.3.5版本,F-Prot Antivirus 4.6.2.117版本,VirusBuster 13.6.151.0版本,Fortinet Antivirus 4.2.254.0版本,Antiy Labs AVL SDK 2.0.3.7版本,K7 AntiVirus 9.77.3565版本,Trend Micro HouseCall 9.120.0.1004版本,Kaspersky Anti-Virus 7.0.0.125版本,Jiangmin Antivirus 13.0.900版本,Microsoft Security Essentials 2.0中的Antimalware Engine 1.1.6402.0版本,Sophos Anti-Virus 4.61.0版本,NOD32 Antivirus 5795版本,Avira AntiVir 7.11.1.163版本,Norman Antivirus 6.06.12版本,McAfee Anti-Virus Scanning Engine 5.400.0.1158版本,Panda Antivirus 10.0.2.7版本,McAfee Gateway(原为Webwasher)2010.1C版本,Trend Micro AntiVirus 9.120.0.1004版本,Comodo Antivirus 7424版本,Bitdefender 7.2版本,eSafe 7.0.17.0版本,F-Secure Anti-Virus 9.0.16160.0版本,nProtect A! nti-Virus 2011-01-17.01版本,AhnLab V3 Internet Security 2011.01.18.00版本,AVG Anti-Virus 10.0.0.1190版本,avast! Antivirus 4.8.1351.0和5.0.677.0版本,和VBA32 3.12.14.2版本中的RAR文件解析器中存在漏洞。远程攻击者可利用该漏洞借助初始MZ字符序列号的RAR文件,绕过恶意软件检测。

英文描述:

The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.

CWE类型:
CWE-264
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
ahnlab v3_internet_security 2011.01.18.00 - - cpe:2.3:a:ahnlab:v3_internet_security:2011.01.18.00:*:*:*:*:*:*:*
aladdin esafe 7.0.17.0 - - cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*
alwil avast_antivirus 4.8.1351.0 - - cpe:2.3:a:alwil:avast_antivirus:4.8.1351.0:*:*:*:*:*:*:*
alwil avast_antivirus 5.0.677.0 - - cpe:2.3:a:alwil:avast_antivirus:5.0.677.0:*:*:*:*:*:*:*
anti-virus vba32 3.12.14.2 - - cpe:2.3:a:anti-virus:vba32:3.12.14.2:*:*:*:*:*:*:*
antiy avl_sdk 2.0.3.7 - - cpe:2.3:a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*
authentium command_antivirus 5.2.11.5 - - cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*
avg avg_anti-virus 10.0.0.1190 - - cpe:2.3:a:avg:avg_anti-virus:10.0.0.1190:*:*:*:*:*:*:*
avira antivir 7.11.1.163 - - cpe:2.3:a:avira:antivir:7.11.1.163:*:*:*:*:*:*:*
bitdefender bitdefender 7.2 - - cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*
cat quick_heal 11.00 - - cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*
clamav clamav 0.96.4 - - cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*
comodo comodo_antivirus 7424 - - cpe:2.3:a:comodo:comodo_antivirus:7424:*:*:*:*:*:*:*
emsisoft anti-malware 5.1.0.1 - - cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*
eset nod32_antivirus 5795 - - cpe:2.3:a:eset:nod32_antivirus:5795:*:*:*:*:*:*:*
f-prot f-prot_antivirus 4.6.2.117 - - cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*
f-secure f-secure_anti-virus 9.0.16160.0 - - cpe:2.3:a:f-secure:f-secure_anti-virus:9.0.16160.0:*:*:*:*:*:*:*
fortinet fortinet_antivirus 4.2.254.0 - - cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*
gdata-software g_data_antivirus 21 - - cpe:2.3:a:gdata-software:g_data_antivirus:21:*:*:*:*:*:*:*
ikarus ikarus_virus_utilities_t3_command_line_scanner 1.1.97.0 - - cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*
jiangmin jiangmin_antivirus 13.0.900 - - cpe:2.3:a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*
k7computing antivirus 9.77.3565 - - cpe:2.3:a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*
kaspersky kaspersky_anti-virus 7.0.0.125 - - cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*
mcafee gateway 2010.1c - - cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*
mcafee scan_engine 5.400.0.1158 - - cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*
microsoft security_essentials 2.0 - - cpe:2.3:a:microsoft:security_essentials:2.0:*:*:*:*:*:*:*
norman norman_antivirus_\&_antispyware 6.06.12 - - cpe:2.3:a:norman:norman_antivirus_\&_antispyware:6.06.12:*:*:*:*:*:*:*
nprotect nprotect_antivirus 2011-01-17.01 - - cpe:2.3:a:nprotect:nprotect_antivirus:2011-01-17.01:*:*:*:*:*:*:*
pandasecurity panda_antivirus 10.0.2.7 - - cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*
pc_tools pc_tools_antivirus 7.0.3.5 - - cpe:2.3:a:pc_tools:pc_tools_antivirus:7.0.3.5:*:*:*:*:*:*:*
rising-global rising_antivirus 22.83.00.03 - - cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*
sophos sophos_anti-virus 4.61.0 - - cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*
symantec endpoint_protection 11.0 - - cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*
trendmicro housecall 9.120.0.1004 - - cpe:2.3:a:trendmicro:housecall:9.120.0.1004:*:*:*:*:*:*:*
trendmicro trend_micro_antivirus 9.120.0.1004 - - cpe:2.3:a:trendmicro:trend_micro_antivirus:9.120.0.1004:*:*:*:*:*:*:*
virusbuster virusbuster 13.6.151.0 - - cpe:2.3:a:virusbuster:virusbuster:13.6.151.0:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
80472 vdb-entry
cve.org
访问
20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products mailing-list
cve.org
访问
52612 vdb-entry
cve.org
访问
80467 vdb-entry
cve.org
访问
80461 vdb-entry
cve.org
访问
80470 vdb-entry
cve.org
访问
80460 vdb-entry
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
80468 vdb-entry
cve.org
访问
80456 vdb-entry
cve.org
访问
80457 vdb-entry
cve.org
访问
80458 vdb-entry
cve.org
访问
80454 vdb-entry
cve.org
访问
80455 vdb-entry
cve.org
访问
80459 vdb-entry
cve.org
访问
80469 vdb-entry
cve.org
访问
80471 vdb-entry
cve.org
访问
CVSS评分详情
4.3
MEDIUM
CVSS向量: AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS版本: 2.0
机密性
NONE
完整性
PARTIAL
可用性
NONE
时间信息
发布时间:
2012-03-21 10:00:00
修改时间:
2024-08-06 19:01:00
创建时间:
2025-11-11 15:33:22
更新时间:
2025-11-11 15:50:03
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2012-1443 2025-11-11 15:18:27 2025-11-11 07:33:22
NVD nvd_CVE-2012-1443 2025-11-11 14:53:57 2025-11-11 07:42:11
CNNVD cnnvd_CNNVD-201203-407 2025-11-11 15:09:15 2025-11-11 07:50:03
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:50:03
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-201203-407; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-201203-407
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:42:11
cvss_score: 未提取 → 4.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:N/I:P/A:N; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 36; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 4.3
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:N/I:P/A:N
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 36
  • data_sources: ['cve'] -> ['cve', 'nvd']