CVE-2008-1412
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
20/03/2008
Last modified:
23/04/2026
Description
Unspecified vulnerability in multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, and others, allows remote attackers to execute arbitrary code or cause a denial of service (hang or crash) via a malformed archive that triggers an unhandled exception, as demonstrated by the PROTOS GENOME test suite for Archive Formats.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:f-secure:f-secure_anti-virus:2006:*:*:*:*:*:*:* | ||
| cpe:2.3:a:f-secure:f-secure_anti-virus:2007:*:*:*:*:*:*:* | ||
| cpe:2.3:a:f-secure:f-secure_anti-virus:2007:second_edition:*:*:*:*:*:* | ||
| cpe:2.3:a:f-secure:f-secure_anti-virus:2008:*:*:*:*:*:*:* | ||
| cpe:2.3:a:f-secure:f-secure_anti-virus_client_security:*:*:*:*:*:*:*:* | 6.04 (including) | |
| cpe:2.3:a:f-secure:f-secure_anti-virus_for_linux:*:*:*:*:*:*:*:* | 4.65 (including) | |
| cpe:2.3:a:f-secure:f-secure_anti-virus_for_workstations:*:*:*:*:*:*:*:* | 7.11 (including) | |
| cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:*:*:*:*:*:*:*:* | 5.54 (including) | |
| cpe:2.3:a:f-secure:f-secure_client_security:*:*:*:*:*:*:*:* | 7.11 (including) | |
| cpe:2.3:a:f-secure:f-secure_internet_security:2006:*:*:*:*:*:*:* | ||
| cpe:2.3:a:f-secure:f-secure_internet_security:2007:*:*:*:*:*:*:* | ||
| cpe:2.3:a:f-secure:f-secure_internet_security:2007:second_edition:*:*:*:*:*:* | ||
| cpe:2.3:a:f-secure:f-secure_internet_security:2008:*:*:*:*:*:*:* | ||
| cpe:2.3:a:f-secure:f-secure_mobile_antivirus_for_s60:2nd_edition:*:*:*:*:*:*:* | ||
| cpe:2.3:a:f-secure:f-secure_mobile_antivirus_for_windows_mobile:5.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/29397
- http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-cs-hotfixes.shtml
- http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-mimesweeper-hotfixes.shtml
- http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/
- http://www.f-secure.com/security/fsc-2008-2.shtml
- http://www.securityfocus.com/bid/28282
- http://www.securitytracker.com/id?1019618
- http://www.securitytracker.com/id?1019619
- http://www.securitytracker.com/id?1019620
- http://www.vupen.com/english/advisories/2008/0903/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41234
- http://secunia.com/advisories/29397
- http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-cs-hotfixes.shtml
- http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-mimesweeper-hotfixes.shtml
- http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/
- http://www.f-secure.com/security/fsc-2008-2.shtml
- http://www.securityfocus.com/bid/28282
- http://www.securitytracker.com/id?1019618
- http://www.securitytracker.com/id?1019619
- http://www.securitytracker.com/id?1019620
- http://www.vupen.com/english/advisories/2008/0903/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41234



