Vulnerability CVE-2005-3373


Published: 2005-10-30   Modified: 2012-02-12

Description:
Multiple interpretation error in Dr.Web 4.32b allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."

CVSS2 => (AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.1/10
6.4/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Dr.web -> Dr.web antivirus 

 References:
http://www.securityelf.org/updmagic.html
http://www.securityelf.org/magicbyteadv.html
http://www.securityelf.org/magicbyte.html
http://marc.theaimsgroup.com/?l=bugtraq&m=113026417802703&w=2
http://www.securityfocus.com/bid/15189

Copyright 2024, cxsecurity.com

 

Back to Top