Description
The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
CVSS Metrics
- Vector
- AV:N/AC:M/Au:N/C:N/I:P/A:N
- Access Vector
- network
- Access Cmplx
- medium
- Auth
- none
- Confidentiality
- none
- Integrity
- partial
- Availability
- none
- Weaknesses
- CWE-264
Metadata
- Primary Vendor
- AUTHENTIUM
- Published
- 3/21/2012
- Last Modified
- 4/11/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
authentium : command_antiviruscat : quick_healeset : nod32_antivirusf-prot : f-prot_antivirusfortinet : fortinet_antivirusk7computing : antiviruskaspersky : kaspersky_anti-virusmicrosoft : security_essentialsnorman : norman_antivirus_\&_antispywarepandasecurity : panda_antivirusrising-global : rising_antivirus
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.