CVE-2012-1453

Antiy Avl SDK - Access Control

Title source: rule

Description

The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.

Scores

EPSS 0.7848
EPSS Percentile 99.0%

Classification

CWE
CWE-264
Status draft

Affected Products (14)

antiy/avl_sdk
ca/etrust_vet_antivirus
drweb/dr.web_antivirus
emsisoft/anti-malware
fortinet/fortinet_antivirus
ikarus/ikarus_virus_utilities_t3_command_line_scanner
kaspersky/kaspersky_anti-virus
mcafee/gateway
microsoft/security_essentials
pandasecurity/panda_antivirus
rising-global/rising_antivirus
sophos/sophos_anti-virus
trendmicro/housecall
trendmicro/trend_micro_antivirus

Timeline

Published Mar 21, 2012
Tracked Since Feb 18, 2026