Public Date:
806101: CVE-2012-1459 clamav: specially-crafted length field in tar files evade detection

The MITRE CVE dictionary describes this issue as:

The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir, Antiy Labs AVL SDK, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus, Comodo Antivirus 7424, Emsisoft Anti-Malware, F-Prot Antivirus, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus, PC Tools AntiVirus, Rising Antivirus, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus, Trend Micro HouseCall, VBA32, and VirusBuster allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.

Find out more about CVE-2012-1459 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 5
Base Metrics AV:N/AC:L/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).