{"id":"PYSEC-2012-23","details":"The ELF file parser in Bitdefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \\4a\\46\\49\\46 character sequence at a certain location.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.","modified":"2024-11-21T14:22:41.056758Z","published":"2012-03-21T10:11:00Z","withdrawn":"2024-11-22T04:37:03Z","references":[{"type":"WEB","url":"http://www.securityfocus.com/archive/1/522005"},{"type":"WEB","url":"http://www.ieee-security.org/TC/SP2012/program.html"}],"affected":[{"package":{"name":"bitdefender","ecosystem":"PyPI","purl":"pkg:pypi/bitdefender"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.0.1"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/bitdefender/PYSEC-2012-23.yaml"}}],"schema_version":"1.7.3"}