Vulnerability CVE-2005-3401


Published: 2005-11-01   Modified: 2012-02-12

Description:
Multiple interpretation error in TheHacker 5.8.4.128 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability through
Andrey Bayora (a...
26.10.2005
High
Update for the magic byte bug
Andrey Bayora
27.10.2005

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Thehacker -> Thehacker 

 References:
http://marc.theaimsgroup.com/?l=bugtraq&m=113036131526435&w=2
http://marc.theaimsgroup.com/?l=bugtraq&m=113026417802703&w=2
http://securityreason.com/securityalert/122
http://securityreason.com/securityalert/114

Copyright 2024, cxsecurity.com

 

Back to Top