4.3
CVSSv2

CVE-2012-1458

Published: 21/03/2012 Updated: 18/01/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The Microsoft CHM file parser in ClamAV 0.96.4 and Sophos Anti-Virus 4.61.0 allows remote malicious users to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CHM parser implementations.

Vulnerable Product Search on Vulmon Subscribe to Product

clamav clamav 0.96.4

sophos sophos anti-virus 4.61.0

Vendor Advisories

Debian Bug report logs - #668273 Multiple security issues Package: clamav; Maintainer for clamav is ClamAV Team <pkg-clamav-devel@listsaliothdebianorg>; Source for clamav is src:clamav (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde> Date: Tue, 10 Apr 2012 13:39:01 UTC Severity: i ...
USN-1482-1 introduced a regression in ClamAV that could cause it to fail to scan certain documents ...
ClamAV could improperly detect malware if it opened a specially crafted file ...
ClamAV could improperly detect malware if it opened a specially crafted file ...