Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Sophos_anti\-Virus
(Sophos)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 36 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2012-03-21 | CVE-2012-1458 | The Microsoft CHM file parser in ClamAV 0.96.4 and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CHM parser implementations. | Clamav, Sophos_anti\-Virus | N/A | ||
2012-03-21 | CVE-2012-1456 | The TAR file parser in AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus... | Esafe, Avg_anti\-Virus, Quick_heal, Comodo_antivirus, Anti\-Malware, Nod32_antivirus, F\-Prot_antivirus, Fortinet_antivirus, Ikarus_virus_utilities_t3_command_line_scanner, Jiangmin_antivirus, Kaspersky_anti\-Virus, Gateway, Scan_engine, Norman_antivirus_\&_antispyware, Panda_antivirus, Rising_antivirus, Sophos_anti\-Virus, Endpoint_protection, Housecall, Trend_micro_antivirus | N/A | ||
2012-03-21 | CVE-2012-1453 | The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0,... | Avl_sdk, Etrust_vet_antivirus, Dr\.web_antivirus, Anti\-Malware, Fortinet_antivirus, Ikarus_virus_utilities_t3_command_line_scanner, Kaspersky_anti\-Virus, Gateway, Security_essentials, Panda_antivirus, Rising_antivirus, Sophos_anti\-Virus, Housecall, Trend_micro_antivirus | N/A | ||
2012-03-21 | CVE-2012-1450 | The CAB file parser in Emsisoft Anti-Malware 5.1.0.1, Sophos Anti-Virus 4.61.0, and Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0 allows remote attackers to bypass malware detection via a CAB file with a modified reserved3 field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations. | Anti\-Malware, Ikarus_virus_utilities_t3_command_line_scanner, Sophos_anti\-Virus | N/A | ||
2012-03-21 | CVE-2012-1446 | The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Norman Antivirus 6.06.12, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, McAfee Gateway (formerly Webwasher) 2010.1C, Sophos Anti-Virus 4.61.0, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7... | Esafe, Avl_sdk, Etrust_vet_antivirus, Quick_heal, Fortinet_antivirus, Kaspersky_anti\-Virus, Gateway, Scan_engine, Norman_antivirus_\&_antispyware, Panda_antivirus, Pc_tools_antivirus, Rising_antivirus, Sophos_anti\-Virus, Endpoint_protection | N/A | ||
2012-03-21 | CVE-2012-1443 | The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall... | V3_internet_security, Esafe, Avast_antivirus, Vba32, Avl_sdk, Command_antivirus, Avg_anti\-Virus, Antivir, Bitdefender, Quick_heal, Clamav, Comodo_antivirus, Anti\-Malware, Nod32_antivirus, F\-Prot_antivirus, F\-Secure_anti\-Virus, Fortinet_antivirus, G_data_antivirus, Ikarus_virus_utilities_t3_command_line_scanner, Jiangmin_antivirus, Antivirus, Kaspersky_anti\-Virus, Gateway, Scan_engine, Security_essentials, Norman_antivirus_\&_antispyware, Nprotect_antivirus, Panda_antivirus, Pc_tools_antivirus, Rising_antivirus, Sophos_anti\-Virus, Endpoint_protection, Housecall, Trend_micro_antivirus, Virusbuster | N/A | ||
2012-03-21 | CVE-2012-1442 | The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, F-Secure Anti-Virus 9.0.16160.0, Sophos Anti-Virus 4.61.0, Antiy Labs AVL SDK 2.0.3.7, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified class field. NOTE: this may later... | Esafe, Avl_sdk, Quick_heal, F\-Secure_anti\-Virus, Fortinet_antivirus, Kaspersky_anti\-Virus, Gateway, Scan_engine, Panda_antivirus, Rising_antivirus, Sophos_anti\-Virus | N/A | ||
2012-03-21 | CVE-2012-1438 | The Microsoft Office file parser in Comodo Antivirus 7425 and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via an Office file with a ustar character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Office parser implementations. | Comodo_antivirus, Sophos_anti\-Virus | N/A | ||
2012-03-21 | CVE-2012-1431 | The ELF file parser in Bitdefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if... | Esafe, Command_antivirus, Bitdefender, Comodo_antivirus, F\-Prot_antivirus, F\-Secure_anti\-Virus, Gateway, Nprotect_antivirus, Rising_antivirus, Sophos_anti\-Virus | N/A | ||
2012-03-21 | CVE-2012-1430 | The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional... | Esafe, Bitdefender, Comodo_antivirus, Anti\-Virus, Gateway, Scan_engine, Nprotect_antivirus, Rising_antivirus, Sophos_anti\-Virus | N/A |