The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, F-Secure Anti-Virus 9.0.16160.0, Sophos Anti-Virus 4.61.0, Antiy Labs AVL SDK 2.0.3.7, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote malicious users to bypass malware detection via an ELF file with a modified class field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
kaspersky kaspersky anti-virus 7.0.0.125 |
||
f-secure f-secure anti-virus 9.0.16160.0 |
||
cat quick heal 11.00 |
||
rising-global rising antivirus 22.83.00.03 |
||
fortinet fortinet antivirus 4.2.254.0 |
||
mcafee scan engine 5.400.0.1158 |
||
mcafee gateway 2010.1c |
||
aladdin esafe 7.0.17.0 |
||
pandasecurity panda antivirus 10.0.2.7 |
||
sophos sophos anti-virus 4.61.0 |
||
antiy avl sdk 2.0.3.7 |