Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Sophos_anti\-Virus
(Sophos)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 36 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2012-03-21 | CVE-2012-1442 | The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, F-Secure Anti-Virus 9.0.16160.0, Sophos Anti-Virus 4.61.0, Antiy Labs AVL SDK 2.0.3.7, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified class field. NOTE: this may later... | Esafe, Avl_sdk, Quick_heal, F\-Secure_anti\-Virus, Fortinet_antivirus, Kaspersky_anti\-Virus, Gateway, Scan_engine, Panda_antivirus, Rising_antivirus, Sophos_anti\-Virus | N/A | ||
2012-03-21 | CVE-2012-1438 | The Microsoft Office file parser in Comodo Antivirus 7425 and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via an Office file with a ustar character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Office parser implementations. | Comodo_antivirus, Sophos_anti\-Virus | N/A | ||
2012-03-21 | CVE-2012-1431 | The ELF file parser in Bitdefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if... | Esafe, Command_antivirus, Bitdefender, Comodo_antivirus, F\-Prot_antivirus, F\-Secure_anti\-Virus, Gateway, Nprotect_antivirus, Rising_antivirus, Sophos_anti\-Virus | N/A | ||
2012-03-21 | CVE-2012-1430 | The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional... | Esafe, Bitdefender, Comodo_antivirus, Anti\-Virus, Gateway, Scan_engine, Nprotect_antivirus, Rising_antivirus, Sophos_anti\-Virus | N/A | ||
2012-03-21 | CVE-2012-1428 | The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Norman Antivirus 6.06.12, and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a POSIX TAR file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. | Quick_heal, Norman_antivirus_\&_antispyware, Sophos_anti\-Virus | N/A | ||
2012-03-21 | CVE-2012-1427 | The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Norman Antivirus 6.06.12, and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a POSIX TAR file with a \57\69\6E\5A\69\70 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. | Quick_heal, Norman_antivirus_\&_antispyware, Sophos_anti\-Virus | N/A | ||
2012-03-21 | CVE-2012-1424 | The TAR file parser in Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Jiangmin Antivirus 13.0.900, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a POSIX TAR file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser... | Avl_sdk, Quick_heal, Jiangmin_antivirus, Norman_antivirus_\&_antispyware, Pc_tools_antivirus, Sophos_anti\-Virus | N/A | ||
2008-07-15 | CVE-2008-3177 | Sophos virus detection engine 2.75 on Linux and Unix, as used in Sophos Email Appliance, Pure Message for Unix, and Sophos Anti-Virus Interface (SAVI), allows remote attackers to cause a denial of service (engine crash) via zero-length MIME attachments. | Es1000, Es4000, Sophos_anti\-Virus, Sophos_puremessage_anti\-Virus | N/A | ||
2007-09-10 | CVE-2007-4787 | The virus detection engine in Sophos Anti-Virus before 2.49.0 does not properly process malformed (1) CAB, (2) LZH, and (3) RAR files with modified headers, which might allow remote attackers to bypass malware detection. | Scanning_engine, Sophos_anti\-Virus | N/A | ||
2006-12-12 | CVE-2006-6335 | Multiple buffer overflows in Sophos Anti-Virus scanning engine before 2.40 allow remote attackers to execute arbitrary code via (1) a SIT archive with a long filename that is not null-terminated, which triggers a heap-based overflow in veex.dll due to improper length calculation, and (2) a CPIO archive, with a long filename that is not null-terminated, which triggers a stack-based overflow in veex.dll. | Sophos_anti\-Virus | N/A |