CVE-2012-1459 (CNNVD-201203-422)

MEDIUM
中文标题:
多个杀毒产品TAR文件权限许可和访问控制漏洞
英文标题:
The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy La...
CVSS分数: 4.3
发布时间: 2012-03-21 10:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

AhnLab V3 Internet Security 2011.01.18.00版本,Avira AntiVir 7.11.1.163版本,Antiy Labs AVL SDK 2.0.3.7版本,avast! Antivirus 4.8.1351.0和5.0.677.0版本,AVG Anti-Virus 10.0.0.1190版本,Bitdefender 7.2版本,Quick Heal (也称Cat QuickHeal) 11.00版本,ClamAV 0.96.4版本,Command Antivirus 5.2.11.5版本,Comodo Antivirus 7424版本,Emsisoft Anti-Malware 5.1.0.1版本,F-Prot Antivirus 4.6.2.117版本,F-Secure Anti-Virus 9.0.16160.0版本,Fortinet Antivirus 4.2.254.0版本,G Data AntiVirus 21版本,Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0版本,Jiangmin Antivirus 13.0.900版本,K7 AntiVirus 9.77.3565版本,Kaspersky Anti-Virus 7.0.0.125版本,McAfee Anti-Virus Scanning Engine 5.400.0.1158版本,McAfee Gateway (原为Webwasher) 2010.1C版本,和Microsoft Security Essentials 2.0中的Antimalware Engine 1.1.6402.0版本,NOD32 Antivirus 5795版本,Norman Antivirus 6.06.12版本,nProtect Anti-Virus 2011-01-17.01版本,Panda Antivirus 10.0.2.7版本,PC Tools AntiVirus 7.0.3.5版本,Rising Antivirus 22.83.00.03版本,Sophos Anti-Virus 4.61.0版本,和Symant! ec Endpoint Protection 11中的AVEngine 20101.3.0.103版本,Trend Micro AntiVirus 9.120.0.1004版本, Trend Micro HouseCall 9.120.0.1004版本,VBA32 3.12.14.2版本,和VirusBuster 13.6.151.0版本中的TAR文件解析器中存在漏洞。远程攻击者可利用该漏洞借助与整个条目相关的相对应长度字段,加上下一个条目的部分标题的.TAR归档文件,绕过恶意文件检测。

英文描述:

The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.

CWE类型:
CWE-264
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
ahnlab v3_internet_security 2011.01.18.00 - - cpe:2.3:a:ahnlab:v3_internet_security:2011.01.18.00:*:*:*:*:*:*:*
alwil avast_antivirus 4.8.1351.0 - - cpe:2.3:a:alwil:avast_antivirus:4.8.1351.0:*:*:*:*:*:*:*
alwil avast_antivirus 5.0.677.0 - - cpe:2.3:a:alwil:avast_antivirus:5.0.677.0:*:*:*:*:*:*:*
anti-virus vba32 3.12.14.2 - - cpe:2.3:a:anti-virus:vba32:3.12.14.2:*:*:*:*:*:*:*
antiy avl_sdk 2.0.3.7 - - cpe:2.3:a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*
authentium command_antivirus 5.2.11.5 - - cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*
avg avg_anti-virus 10.0.0.1190 - - cpe:2.3:a:avg:avg_anti-virus:10.0.0.1190:*:*:*:*:*:*:*
avira antivir 7.11.1.163 - - cpe:2.3:a:avira:antivir:7.11.1.163:*:*:*:*:*:*:*
bitdefender bitdefender 7.2 - - cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*
cat quick_heal 11.00 - - cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*
clamav clamav 0.96.4 - - cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*
comodo comodo_antivirus 7424 - - cpe:2.3:a:comodo:comodo_antivirus:7424:*:*:*:*:*:*:*
emsisoft anti-malware 5.1.0.1 - - cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*
eset nod32_antivirus 5795 - - cpe:2.3:a:eset:nod32_antivirus:5795:*:*:*:*:*:*:*
f-prot f-prot_antivirus 4.6.2.117 - - cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*
f-secure f-secure_anti-virus 9.0.16160.0 - - cpe:2.3:a:f-secure:f-secure_anti-virus:9.0.16160.0:*:*:*:*:*:*:*
fortinet fortinet_antivirus 4.2.254.0 - - cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*
gdata-software g_data_antivirus 21 - - cpe:2.3:a:gdata-software:g_data_antivirus:21:*:*:*:*:*:*:*
ikarus ikarus_virus_utilities_t3_command_line_scanner 1.1.97.0 - - cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*
jiangmin jiangmin_antivirus 13.0.900 - - cpe:2.3:a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*
k7computing antivirus 9.77.3565 - - cpe:2.3:a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*
kaspersky kaspersky_anti-virus 7.0.0.125 - - cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*
mcafee gateway 2010.1c - - cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*
mcafee scan_engine 5.400.0.1158 - - cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*
microsoft security_essentials 2.0 - - cpe:2.3:a:microsoft:security_essentials:2.0:*:*:*:*:*:*:*
norman norman_antivirus_\&_antispyware 6.06.12 - - cpe:2.3:a:norman:norman_antivirus_\&_antispyware:6.06.12:*:*:*:*:*:*:*
nprotect nprotect_antivirus 2011-01-17.01 - - cpe:2.3:a:nprotect:nprotect_antivirus:2011-01-17.01:*:*:*:*:*:*:*
pandasecurity panda_antivirus 10.0.2.7 - - cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*
pc_tools pc_tools_antivirus 7.0.3.5 - - cpe:2.3:a:pc_tools:pc_tools_antivirus:7.0.3.5:*:*:*:*:*:*:*
rising-global rising_antivirus 22.83.00.03 - - cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*
sophos sophos_anti-virus 4.61.0 - - cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*
symantec endpoint_protection 11.0 - - cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*
trendmicro housecall 9.120.0.1004 - - cpe:2.3:a:trendmicro:housecall:9.120.0.1004:*:*:*:*:*:*:*
trendmicro trend_micro_antivirus 9.120.0.1004 - - cpe:2.3:a:trendmicro:trend_micro_antivirus:9.120.0.1004:*:*:*:*:*:*:*
virusbuster virusbuster 13.6.151.0 - - cpe:2.3:a:virusbuster:virusbuster:13.6.151.0:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
openSUSE-SU-2012:0833 vendor-advisory
cve.org
访问
80406 vdb-entry
cve.org
访问
80393 vdb-entry
cve.org
访问
20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products mailing-list
cve.org
访问
80403 vdb-entry
cve.org
访问
80389 vdb-entry
cve.org
访问
80391 vdb-entry
cve.org
访问
80409 vdb-entry
cve.org
访问
80396 vdb-entry
cve.org
访问
multiple-av-tar-header-evasion(74302) vdb-entry
cve.org
访问
80392 vdb-entry
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
80390 vdb-entry
cve.org
访问
MDVSA-2012:094 vendor-advisory
cve.org
访问
80407 vdb-entry
cve.org
访问
80395 vdb-entry
cve.org
访问
52623 vdb-entry
cve.org
访问
CVSS评分详情
4.3
MEDIUM
CVSS向量: AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS版本: 2.0
机密性
NONE
完整性
PARTIAL
可用性
NONE
时间信息
发布时间:
2012-03-21 10:00:00
修改时间:
2024-08-06 19:01:01
创建时间:
2025-11-11 15:33:22
更新时间:
2025-11-11 15:50:03
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2012-1459 2025-11-11 15:18:27 2025-11-11 07:33:22
NVD nvd_CVE-2012-1459 2025-11-11 14:53:57 2025-11-11 07:42:11
CNNVD cnnvd_CNNVD-201203-422 2025-11-11 15:09:15 2025-11-11 07:50:03
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:50:03
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-201203-422; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-201203-422
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:42:11
cvss_score: 未提取 → 4.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:N/I:P/A:N; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 35; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 4.3
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:N/I:P/A:N
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 35
  • data_sources: ['cve'] -> ['cve', 'nvd']