The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, F-Secure Anti-Virus 9.0.16160.0, Sophos Anti-Virus 4.61.0, Antiy Labs AVL SDK 2.0.3.7, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified class field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Esafe | Aladdin | 7.0.17.0 (including) | 7.0.17.0 (including) |
| Avl_sdk | Antiy | 2.0.3.7 (including) | 2.0.3.7 (including) |
| Quick_heal | Cat | 11.00 (including) | 11.00 (including) |
| F-secure_anti-virus | F-secure | 9.0.16160.0 (including) | 9.0.16160.0 (including) |
| Fortinet_antivirus | Fortinet | 4.2.254.0 (including) | 4.2.254.0 (including) |
| Kaspersky_anti-virus | Kaspersky | 7.0.0.125 (including) | 7.0.0.125 (including) |
| Gateway | Mcafee | 2010.1c (including) | 2010.1c (including) |
| Scan_engine | Mcafee | 5.400.0.1158 (including) | 5.400.0.1158 (including) |
| Panda_antivirus | Pandasecurity | 10.0.2.7 (including) | 10.0.2.7 (including) |
| Rising_antivirus | Rising-global | 22.83.00.03 (including) | 22.83.00.03 (including) |
| Sophos_anti-virus | Sophos | 4.61.0 (including) | 4.61.0 (including) |