HomeAhnlabCVE-2012-1462

CVE-2012-1462

UNKNOWN
4.3CVSS
Published: 2012-03-21
Updated: 2025-04-11
AI Analysis

Description

The ZIP file parser in AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, Norman Antivirus 6.06.12, Sophos Anti-Virus 4.61.0, and AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11 allows remote attackers to bypass malware detection via a ZIP file containing an invalid block of data at the beginning. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ZIP parser implementations.

CVSS Metrics

Vector
AV:N/AC:M/Au:N/C:N/I:P/A:N
Access Vector
network
Access Cmplx
medium
Auth
none
Confidentiality
none
Integrity
partial
Availability
none
Weaknesses
CWE-264

Metadata

Primary Vendor
AHNLAB
Published
3/21/2012
Last Modified
4/11/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

ahnlab : v3_internet_securityaladdin : esafeavg : avg_anti-viruscat : quick_healemsisoft : anti-malwarefortinet : fortinet_antivirusikarus : ikarus_virus_utilities_t3_command_line_scannerjiangmin : jiangmin_antiviruskaspersky : kaspersky_anti-virussymantec : endpoint_protection

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2012-1462 | UNKNOWN Severity | CVEDatabase.com | CVEDatabase.com