|
|
|
|
| |
Credit:
The original article can be found at: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1461
The original article can be found at: http://www.securityfocus.com/bid/52626
|
| |
Vulnerable Systems:
* AVG Anti-Virus 10.0.0.1190,
* Bitdefender 7.2,
* Command Antivirus 5.2.11.5,
* Emsisoft Anti-Malware 5.1.0.1,
* F-Secure Anti-Virus 9.0.16160.0,
* Fortinet Antivirus 4.2.254.0,
* Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0,
* Jiangmin Antivirus 13.0.900,
* K7 AntiVirus 9.77.3565,
* Kaspersky Anti-Virus 7.0.0.125,
* McAfee Anti-Virus Scanning Engine 5.400.0.1158,
* McAfee Gateway (formerly Webwasher) 2010.1C,
* NOD32 Antivirus 5795,
* Norman Antivirus 6.06.12,
* Rising Antivirus 22.83.00.03,
* Sophos Anti-Virus 4.61.0,
* AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11,
* Trend Micro AntiVirus 9.120.0.1004,
* Trend Micro HouseCall 9.120.0.1004,
* VBA32 3.12.14.2
Multiple Antivirus products are prone to a vulnerability that may allow an attacker to bypass on-demand scans.
Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection.
Vendor Status:
Symantec and other vendors have issued an update for this vulnerablity
Patch Availability:
http://www.securityfocus.com/archive/1/522005
CVE Information:
CVE-2012-1461
|
|
|
|
|