Vulnerability CVE-2008-5532


Published: 2008-12-12   Modified: 2012-02-12

Description:
Ikarus Virus Utilities T3.1.1.45.0 and possibly T3.1.1.34.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.

See advisories in our WLB2 database:
Topic
Author
Date
High
Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass
xhakerman2006 ya...
16.12.2008

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Ikarus -> Ikarus antivirus 

 References:
http://securityreason.com/securityalert/4723
http://www.securityfocus.com/archive/1/498995/100/0/threaded
http://www.securityfocus.com/archive/1/499043/100/0/threaded
https://exchange.xforce.ibmcloud.com/vulnerabilities/47435

Copyright 2024, cxsecurity.com

 

Back to Top