CVE-2012-1457 (CNNVD-201203-420)

MEDIUM
中文标题:
多个杀毒产品TAR文件权限许可和访问控制漏洞
英文标题:
The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.13...
CVSS分数: 4.3
发布时间: 2012-03-21 10:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Avira AntiVir 7.11.1.163版本,Antiy Labs AVL SDK 2.0.3.7版本,avast! Antivirus 4.8.1351.0版本以及5.0.677.0版本,AVG Anti-Virus 10.0.0.1190版本,Bitdefender 7.2版本,Quick Heal(又称Cat QuickHeal)11.00版本,ClamAV 0.96.4版本,Command Antivirus 5.2.11.5版本,Emsisoft Anti-Malware 5.1.0.1版本,eSafe 7.0.17.0版本,F-Prot Antivirus 4.6.2.117版本,G Data AntiVirus 21版本,Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0版本,Jiangmin Antivirus 13.0.900版本,K7 AntiVirus 9.77.3565版本,Kaspersky Anti-Virus 7.0.0.125版本,McAfee Anti-Virus Scanning Engine 5.400.0.1158版本,McAfee Gateway (原为Webwasher) 2010.1C版本,和Microsoft Security Essentials 2.0中的Antimalware Engine 1.1.6402.0版本,NOD32 Antivirus 5795版本, Norman Antivirus 6.06.12版本, PC Tools AntiVirus 7.0.3.5版本,Rising Antivirus 22.83.00.03版本,和Symantec Endpoint Protection 11中的AVEngine 20101.3.0.103版本,Trend Micro AntiVirus 9.120.0.1004版本,Trend Micro HouseCall 9.120.0.1004版本,VBA32 3.12.14.2版本,和VirusBuster 13.6.151.0版本中的TAR文件解析器中存在漏洞。远程攻击者借助a! TAR归档文件超过总TAR文件大小的长度字段,绕过恶意软件检测。

英文描述:

The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.

CWE类型:
CWE-264
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
aladdin esafe 7.0.17.0 - - cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*
alwil avast_antivirus 4.8.1351.0 - - cpe:2.3:a:alwil:avast_antivirus:4.8.1351.0:*:*:*:*:*:*:*
alwil avast_antivirus 5.0.677.0 - - cpe:2.3:a:alwil:avast_antivirus:5.0.677.0:*:*:*:*:*:*:*
anti-virus vba32 3.12.14.2 - - cpe:2.3:a:anti-virus:vba32:3.12.14.2:*:*:*:*:*:*:*
antiy avl_sdk 2.0.3.7 - - cpe:2.3:a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*
authentium command_antivirus 5.2.11.5 - - cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*
avg avg_anti-virus 10.0.0.1190 - - cpe:2.3:a:avg:avg_anti-virus:10.0.0.1190:*:*:*:*:*:*:*
avira antivir 7.11.1.163 - - cpe:2.3:a:avira:antivir:7.11.1.163:*:*:*:*:*:*:*
bitdefender bitdefender 7.2 - - cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*
cat quick_heal 11.00 - - cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*
clamav clamav 0.96.4 - - cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*
emsisoft anti-malware 5.1.0.1 - - cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*
eset nod32_antivirus 5795 - - cpe:2.3:a:eset:nod32_antivirus:5795:*:*:*:*:*:*:*
f-prot f-prot_antivirus 4.6.2.117 - - cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*
gdata-software g_data_antivirus 21 - - cpe:2.3:a:gdata-software:g_data_antivirus:21:*:*:*:*:*:*:*
ikarus ikarus_virus_utilities_t3_command_line_scanner 1.1.97.0 - - cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*
jiangmin jiangmin_antivirus 13.0.900 - - cpe:2.3:a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*
k7computing antivirus 9.77.3565 - - cpe:2.3:a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*
kaspersky kaspersky_anti-virus 7.0.0.125 - - cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*
mcafee gateway 2010.1c - - cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*
mcafee scan_engine 5.400.0.1158 - - cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*
microsoft security_essentials 2.0 - - cpe:2.3:a:microsoft:security_essentials:2.0:*:*:*:*:*:*:*
norman norman_antivirus_\&_antispyware 6.06.12 - - cpe:2.3:a:norman:norman_antivirus_\&_antispyware:6.06.12:*:*:*:*:*:*:*
pc_tools pc_tools_antivirus 7.0.3.5 - - cpe:2.3:a:pc_tools:pc_tools_antivirus:7.0.3.5:*:*:*:*:*:*:*
rising-global rising_antivirus 22.83.00.03 - - cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*
symantec endpoint_protection 11.0 - - cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*
trendmicro housecall 9.120.0.1004 - - cpe:2.3:a:trendmicro:housecall:9.120.0.1004:*:*:*:*:*:*:*
trendmicro trend_micro_antivirus 9.120.0.1004 - - cpe:2.3:a:trendmicro:trend_micro_antivirus:9.120.0.1004:*:*:*:*:*:*:*
virusbuster virusbuster 13.6.151.0 - - cpe:2.3:a:virusbuster:virusbuster:13.6.151.0:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
openSUSE-SU-2012:0833 vendor-advisory
cve.org
访问
80406 vdb-entry
cve.org
访问
80393 vdb-entry
cve.org
访问
20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products mailing-list
cve.org
访问
80403 vdb-entry
cve.org
访问
80389 vdb-entry
cve.org
访问
80391 vdb-entry
cve.org
访问
80409 vdb-entry
cve.org
访问
80396 vdb-entry
cve.org
访问
80392 vdb-entry
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
MDVSA-2012:094 vendor-advisory
cve.org
访问
52610 vdb-entry
cve.org
访问
80407 vdb-entry
cve.org
访问
80395 vdb-entry
cve.org
访问
multiple-av-tar-length-evasion(74293) vdb-entry
cve.org
访问
CVSS评分详情
4.3
MEDIUM
CVSS向量: AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS版本: 2.0
机密性
NONE
完整性
PARTIAL
可用性
NONE
时间信息
发布时间:
2012-03-21 10:00:00
修改时间:
2024-08-06 19:01:00
创建时间:
2025-11-11 15:33:22
更新时间:
2025-11-11 15:50:03
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2012-1457 2025-11-11 15:18:27 2025-11-11 07:33:22
NVD nvd_CVE-2012-1457 2025-11-11 14:53:57 2025-11-11 07:42:11
CNNVD cnnvd_CNNVD-201203-420 2025-11-11 15:09:15 2025-11-11 07:50:03
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:50:03
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-201203-420; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-201203-420
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:42:11
cvss_score: 未提取 → 4.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:N/I:P/A:N; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 29; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 4.3
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:N/I:P/A:N
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 29
  • data_sources: ['cve'] -> ['cve', 'nvd']