Many factors could come into play in a situation such as this. Any application can suffer the vagaries of the Windows Installer, and experience a partial uninstall. This can apply even more to security software which is hardened to resist unauthorized shutdown or uninstall (watchdog), and may need to be uninstalled in a specific way.
It's also worth researching false positives before jumping to any conclusions. For example, the number of false alarms experienced here:
As well, it's not unusual for security software to report hits in other security software, since the measures taken by the likes of Antivirus and Anti-rootkit packages operate in similar ways to the malware they are combating. For example, McAfee identifies the PUP Application.Bundler.Somoto not only for Bitdefender but as also present in EMSI, Kaspersky, ESET, Panda... (Virus Characteristics tab on link below)
To me, that wouldn't indicate all those AV packages are untrustworthy.
As is noted there: "PUPs are often made by a legitimate corporate entity for some beneficial purpose" however especially in a corporate environment, it's appropriated for whoever is responsible for the security environment to be made aware of its existence. In a situation where its presence is normal and to be expected, no action would be required.
Edited by Platypus, 07 July 2014 - 10:01 AM.