PYSEC-2012-23

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/bitdefender/PYSEC-2012-23.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2012-23
Withdrawn
2024-11-22T04:37:03Z
Published
2012-03-21T10:11:00Z
Modified
2024-11-21T14:22:41.056758Z
Summary
[none]
Details

The ELF file parser in Bitdefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.

References

Affected packages

PyPI / bitdefender

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.0.1