This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Sophos First view 2004-02-12
Product Sophos Anti-Virus Last view 2014-02-10
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:* 17
cpe:2.3:a:sophos:sophos_anti-virus:3.78:*:*:*:*:*:*:* 13
cpe:2.3:a:sophos:sophos_anti-virus:3.4.6:*:*:*:*:*:*:* 13
cpe:2.3:a:sophos:sophos_anti-virus:3.79:*:*:*:*:*:*:* 12
cpe:2.3:a:sophos:sophos_anti-virus:3.80:*:*:*:*:*:*:* 12
cpe:2.3:a:sophos:sophos_anti-virus:3.78d:*:*:*:*:*:*:* 12
cpe:2.3:a:sophos:sophos_anti-virus:3.85:*:*:*:*:*:*:* 12
cpe:2.3:a:sophos:sophos_anti-virus:3.86:*:*:*:*:*:*:* 12
cpe:2.3:a:sophos:sophos_anti-virus:3.81:*:*:*:*:*:*:* 12
cpe:2.3:a:sophos:sophos_anti-virus:3.82:*:*:*:*:*:*:* 12
cpe:2.3:a:sophos:sophos_anti-virus:3.83:*:*:*:*:*:*:* 12
cpe:2.3:a:sophos:sophos_anti-virus:3.84:*:*:*:*:*:*:* 12
cpe:2.3:a:sophos:sophos_anti-virus:3.90:*:*:*:*:*:*:* 5
cpe:2.3:a:sophos:sophos_anti-virus:*:*:*:*:*:*:*:* 5
cpe:2.3:a:sophos:sophos_anti-virus:3.91:*:*:*:*:*:*:* 5
cpe:2.3:a:sophos:sophos_anti-virus:5.0.1:*:*:*:*:*:*:* 5
cpe:2.3:a:sophos:sophos_anti-virus:3.95:*:*:*:*:*:*:* 4
cpe:2.3:a:sophos:sophos_anti-virus:4.5.3:*:*:*:*:*:*:* 4
cpe:2.3:a:sophos:sophos_anti-virus:5.0.4:*:*:*:*:*:*:* 4
cpe:2.3:a:sophos:sophos_anti-virus:5.1:*:*:*:*:*:*:* 4
cpe:2.3:a:sophos:sophos_anti-virus:3.91_engine_2.28.4:*:*:*:*:*:*:* 3
cpe:2.3:a:sophos:sophos_anti-virus:5.0.2:*:*:*:*:*:*:* 3
cpe:2.3:a:sophos:sophos_anti-virus:4.5.11:*:*:*:*:*:*:* 3
cpe:2.3:a:sophos:sophos_anti-virus:4.05:*:*:*:*:*:*:* 3
cpe:2.3:a:sophos:sophos_anti-virus:4.7.1:*:*:*:*:*:*:* 3
cpe:2.3:a:sophos:sophos_anti-virus:4.5.4:*:*:*:*:*:*:* 3
cpe:2.3:a:sophos:sophos_anti-virus:4.7.2:*:*:*:*:*:*:* 3
cpe:2.3:a:sophos:sophos_anti-virus:3.96:*:*:*:*:*:*:* 3
cpe:2.3:a:sophos:sophos_anti-virus:4.5.12:*:*:*:*:*:*:* 3
cpe:2.3:a:sophos:sophos_anti-virus:4.04:*:*:*:*:*:*:* 3
cpe:2.3:a:sophos:sophos_anti-virus:3.93:*:*:*:*:*:*:* 3
cpe:2.3:a:sophos:sophos_anti-virus:5.2.0:*:*:*:*:*:*:* 2
cpe:2.3:a:sophos:sophos_anti-virus:6.5.4_r2:*:*:*:*:*:*:* 1
cpe:2.3:a:sophos:sophos_anti-virus:6.5.8:*:*:*:*:*:*:* 1
cpe:2.3:a:sophos:sophos_anti-virus:5.2.1:*:*:*:*:*:*:* 1
cpe:2.3:a:sophos:sophos_anti-virus:6.0:*:*:*:*:*:*:* 1
cpe:2.3:a:sophos:sophos_anti-virus:6.5:*:*:*:*:*:*:* 1
cpe:2.3:a:sophos:sophos_anti-virus:7.0:*:*:*:*:*:*:* 1
cpe:2.3:a:sophos:sophos_anti-virus:10.0.11:*:*:*:*:*:*:* 1

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5.6 2014-02-10 CVE-2014-1213

Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof "ready for update" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects.

4.3 2012-03-21 CVE-2012-1461

The Gzip file parser in AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with multiple compressed streams. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations.

4.3 2012-03-21 CVE-2012-1459

The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.

4.3 2012-03-21 CVE-2012-1458

The Microsoft CHM file parser in ClamAV 0.96.4 and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CHM parser implementations.

4.3 2012-03-21 CVE-2012-1456

The TAR file parser in AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a TAR file with an appended ZIP file. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.

4.3 2012-03-21 CVE-2012-1453

The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.

4.3 2012-03-21 CVE-2012-1450

The CAB file parser in Emsisoft Anti-Malware 5.1.0.1, Sophos Anti-Virus 4.61.0, and Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0 allows remote attackers to bypass malware detection via a CAB file with a modified reserved3 field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.

4.3 2012-03-21 CVE-2012-1446

The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Norman Antivirus 6.06.12, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, McAfee Gateway (formerly Webwasher) 2010.1C, Sophos Anti-Virus 4.61.0, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified encoding field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.

4.3 2012-03-21 CVE-2012-1443

The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.

4.3 2012-03-21 CVE-2012-1442

The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, F-Secure Anti-Virus 9.0.16160.0, Sophos Anti-Virus 4.61.0, Antiy Labs AVL SDK 2.0.3.7, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified class field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.

4.3 2012-03-21 CVE-2012-1438

The Microsoft Office file parser in Comodo Antivirus 7425 and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via an Office file with a ustar character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Office parser implementations.

4.3 2012-03-21 CVE-2012-1431

The ELF file parser in Bitdefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.

4.3 2012-03-21 CVE-2012-1430

The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.

4.3 2012-03-21 CVE-2012-1428

The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Norman Antivirus 6.06.12, and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a POSIX TAR file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.

4.3 2012-03-21 CVE-2012-1427

The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Norman Antivirus 6.06.12, and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a POSIX TAR file with a \57\69\6E\5A\69\70 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.

4.3 2012-03-21 CVE-2012-1424

The TAR file parser in Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Jiangmin Antivirus 13.0.900, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a POSIX TAR file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.

5 2008-07-15 CVE-2008-3177

Sophos virus detection engine 2.75 on Linux and Unix, as used in Sophos Email Appliance, Pure Message for Unix, and Sophos Anti-Virus Interface (SAVI), allows remote attackers to cause a denial of service (engine crash) via zero-length MIME attachments.

5 2007-09-10 CVE-2007-4787

The virus detection engine in Sophos Anti-Virus before 2.49.0 does not properly process malformed (1) CAB, (2) LZH, and (3) RAR files with modified headers, which might allow remote attackers to bypass malware detection.

10 2006-12-12 CVE-2006-6335

Multiple buffer overflows in Sophos Anti-Virus scanning engine before 2.40 allow remote attackers to execute arbitrary code via (1) a SIT archive with a long filename that is not null-terminated, which triggers a heap-based overflow in veex.dll due to improper length calculation, and (2) a CPIO archive, with a long filename that is not null-terminated, which triggers a stack-based overflow in veex.dll.

5 2006-11-01 CVE-2006-4839

Sophos Anti-Virus 5.1 allows remote attackers to cause a denial of service (memory consumption) via a file that is compressed with Petite and contains a large number of sections.

7.5 2006-05-10 CVE-2006-0994

Multiple Sophos Anti-Virus products, including Anti-Virus for Windows 5.x before 5.2.1 and 4.x before 4.05, when cabinet file inspection is enabled, allows remote attackers to execute arbitrary code via a CAB file with "invalid folder count values," which leads to heap corruption.

5 2005-12-31 CVE-2005-4680

Sophos Anti-Virus before 4.02, 4.5.x before 4.5.9, 4.6.x before 4.6.9, and 5.x before 5.1.4 allow remote attackers to hide arbitrary files and data via crafted ARJ archives, which are not properly scanned.

5 2005-10-30 CVE-2005-3382

Multiple interpretation error in Sophos 3.91 with the 2.28.4 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."

5.1 2005-10-14 CVE-2005-3216

Multiple interpretation error in unspecified versions of Sophos Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.

7.5 2005-09-02 CVE-2005-2768

Heap-based buffer overflow in the Sophos Antivirus Library, as used by Sophos Antivirus, PureMessage, MailMonitor, and other products, allows remote attackers to execute arbitrary code via a Visio file with a crafted sub record length.

CWE : Common Weakness Enumeration

%idName
88% (16) CWE-264 Permissions, Privileges, and Access Controls
5% (1) CWE-20 Improper Input Validation
5% (1) CWE-16 Configuration

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Name
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-7 Blind SQL Injection
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-13 Subverting Environment Variable Values
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-22 Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-28 Fuzzing
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-32 Embedding Scripts in HTTP Query Strings
CAPEC-42 MIME Conversion
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-52 Embedding NULL Bytes
CAPEC-53 Postfix, Null Terminate, and Backslash
CAPEC-63 Simple Script Injection
CAPEC-64 Using Slashes and URL Encoding Combined to Bypass Validation Logic
CAPEC-66 SQL Injection
CAPEC-67 String Format Overflow in syslog()
CAPEC-71 Using Unicode Encoding to Bypass Validation Logic

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:17990 USN-1482-3 -- clamav regression
oval:org.mitre.oval:def:17740 USN-1482-2 -- clamav regression
oval:org.mitre.oval:def:17465 USN-1482-1 -- clamav vulnerabilities

Open Source Vulnerability Database (OSVDB)

id Description
46929 Sophos Multiple Products Zero-byte MIME Attachment Handling DoS
45184 Sophos Anti-Virus qmail Generated Delivery Status Notification (DSN) Scanning...
37988 Sophos Anti-Virus Multiple Archive Scan Detection Bypass
31338 Sophos Anti-Virus veex.dll SIT Filename Processing Overflow
31337 Sophos Anti-Virus veex.dll CPIO Filename Processing Overflow
30111 Sophos Anti-Virus Crafted Petite Compressed File Handling DoS
25454 Sophos Anti-Virus Cabinet File Folder Count Memory Corruption
24107 Sophos Anti-Virus Crafted ARJ File Scan Bypass
20932 Multiple Anti-Virus Crafted Filetype Header Scan Bypass (magic byte)
19954 Multiple Anti-Virus Engine Crafted Archive Header Virus Detection Bypass
18464 Sophos Anti-Virus Visio File Processing Overflow
17910 Sophos Anti-Virus BZIP Archive Processing DoS
16578 Sophos Anti-Virus File Download Scan Bypass Weakness
10963 Multiple Anti-Virus Zero Compressed Size Header Detection Bypass

ExploitDB Exploits

id Description
629 Multiple AntiVirus (zip file) Detection Bypass Exploit

OpenVAS Exploits

id Description
2012-12-13 Name : SuSE Update for ClamAV openSUSE-SU-2012:0833-1 (ClamAV)
File : nvt/gb_suse_2012_0833_1.nasl
2012-08-30 Name : Fedora Update for clamav FEDORA-2012-9563
File : nvt/gb_fedora_2012_9563_clamav_fc17.nasl
2012-08-17 Name : Ubuntu Update for clamav USN-1482-3
File : nvt/gb_ubuntu_USN_1482_3.nasl
2012-08-10 Name : FreeBSD Ports: clamav
File : nvt/freebsd_clamav17.nasl
2012-07-16 Name : Fedora Update for clamav FEDORA-2012-9577
File : nvt/gb_fedora_2012_9577_clamav_fc16.nasl
2012-06-22 Name : Ubuntu Update for clamav USN-1482-1
File : nvt/gb_ubuntu_USN_1482_1.nasl
2012-06-22 Name : Ubuntu Update for clamav USN-1482-2
File : nvt/gb_ubuntu_USN_1482_2.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200410-31 (Archive::Zip)
File : nvt/glsa_200410_31.nasl
2008-09-04 Name : FreeBSD Ports: p5-Archive-Zip
File : nvt/freebsd_p5-Archive-Zip.nasl

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 Sophos Anti-Virus CAB file overflow attempt
RuleID : 6504 - Type : FILE-OTHER - Revision : 14
2019-08-31 TAR multiple antivirus evasion attempt
RuleID : 50841 - Type : FILE-OTHER - Revision : 3
2019-08-31 TAR multiple antivirus evasion attempt
RuleID : 50840 - Type : FILE-OTHER - Revision : 3
2019-08-31 TAR multiple antivirus evasion attempt
RuleID : 50837 - Type : FILE-OTHER - Revision : 1
2017-10-10 RAR file malformed header antivirus evasion attempt
RuleID : 44323 - Type : FILE-OTHER - Revision : 2
2014-01-10 Microsoft Internet Explorer RAV Online Scanner ActiveX object access
RuleID : 4188 - Type : BROWSER-PLUGINS - Revision : 12
2015-05-28 Multiple AV products evasion attempt
RuleID : 34227 - Type : INDICATOR-OBFUSCATION - Revision : 3
2015-05-28 Multiple AV products evasion attempt
RuleID : 34226 - Type : INDICATOR-OBFUSCATION - Revision : 3
2014-01-16 CHM LZX compression reset interval anti-virus evasion attempt
RuleID : 28979 - Type : FILE-OTHER - Revision : 3
2014-01-16 CHM LZX compression reset interval anti-virus evasion attempt
RuleID : 28978 - Type : FILE-OTHER - Revision : 3
2014-01-10 Multiple products ZIP archive virus detection bypass attempt
RuleID : 27048 - Type : FILE-OTHER - Revision : 2
2014-01-10 Multiple products ZIP archive virus detection bypass attempt
RuleID : 26989 - Type : FILE-OTHER - Revision : 7
2014-01-10 Multiple products ZIP archive virus detection bypass attempt
RuleID : 26926 - Type : FILE-OTHER - Revision : 8
2014-01-10 .tar multiple antivirus evasion attempt
RuleID : 26598 - Type : FILE-OTHER - Revision : 4
2014-01-10 ELF file parsing in different antivirus evasion attempt
RuleID : 25633 - Type : FILE-OTHER - Revision : 3
2014-01-10 TAR multiple antivirus evasion attempt
RuleID : 23358 - Type : FILE-OTHER - Revision : 6
2014-01-10 ELF multiple antivirus evasion attempts
RuleID : 23357 - Type : FILE-OTHER - Revision : 4
2014-01-10 TAR multiple antivirus evasion attempt
RuleID : 23326 - Type : FILE-OTHER - Revision : 4
2014-01-10 ELF file parsing in different antivirus evasion attempt
RuleID : 21630 - Type : FILE-OTHER - Revision : 5
2014-01-10 ELF file parsing in different antivirus evasion attempt
RuleID : 21629 - Type : FILE-OTHER - Revision : 6
2014-01-10 Sophos Anti-Virus Visio File Parsing Buffer Overflow attempt
RuleID : 17574 - Type : FILE-OFFICE - Revision : 16
2014-01-10 Multiple vendor Antivirus magic byte detection evasion attempt
RuleID : 17278 - Type : FILE-OTHER - Revision : 14
2014-01-10 Multiple vendor Antivirus magic byte detection evasion attempt
RuleID : 17277 - Type : FILE-OTHER - Revision : 14
2014-01-10 Multiple vendor Antivirus magic byte detection evasion attempt
RuleID : 17276 - Type : FILE-OTHER - Revision : 19
2014-01-10 Multiple vendor Antivirus magic byte detection evasion attempt
RuleID : 17248 - Type : SPECIFIC-THREATS - Revision : 3

Nessus® Vulnerability Scanner

id Description
2014-06-13 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2012-362.nasl - Type: ACT_GATHER_INFO
2014-02-05 Name: An antivirus application on the remote Windows host is affected by a denial o...
File: sophos_3_50_1.nasl - Type: ACT_GATHER_INFO
2013-01-25 Name: The remote SuSE 11 host is missing a security update.
File: suse_11_clamav-120622.nasl - Type: ACT_GATHER_INFO
2012-08-17 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-1482-3.nasl - Type: ACT_GATHER_INFO
2012-07-11 Name: The remote Fedora host is missing a security update.
File: fedora_2012-9577.nasl - Type: ACT_GATHER_INFO
2012-07-11 Name: The remote SuSE 10 host is missing a security-related patch.
File: suse_clamav-8200.nasl - Type: ACT_GATHER_INFO
2012-06-27 Name: The remote antivirus service is affected by multiple vulnerabilities.
File: clamav_0_97_5.nasl - Type: ACT_GATHER_INFO
2012-06-25 Name: The remote Fedora host is missing a security update.
File: fedora_2012-9563.nasl - Type: ACT_GATHER_INFO
2012-06-20 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-1482-1.nasl - Type: ACT_GATHER_INFO
2012-06-20 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-1482-2.nasl - Type: ACT_GATHER_INFO
2012-06-18 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_eb12ebeeb7af11e1b5e0000c299b62e1.nasl - Type: ACT_GATHER_INFO
2007-09-07 Name: The remote Windows host has an application that is affected by multiple vulne...
File: sophos_2_49_0.nasl - Type: ACT_GATHER_INFO
2004-11-02 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2004-118.nasl - Type: ACT_GATHER_INFO
2004-11-01 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-200410-31.nasl - Type: ACT_GATHER_INFO