Vulnerability CVE-2008-5545


Published: 2008-12-12   Modified: 2012-02-12

Description:
Trend Micro VSAPI 8.700.0.1004 in Trend Micro AntiVirus, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.

See advisories in our WLB2 database:
Topic
Author
Date
High
Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass
xhakerman2006 ya...
16.12.2008

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Trend micro -> Trend micro antivirus 

 References:
http://securityreason.com/securityalert/4723
http://www.securityfocus.com/archive/1/498995/100/0/threaded
http://www.securityfocus.com/archive/1/499043/100/0/threaded
https://exchange.xforce.ibmcloud.com/vulnerabilities/47435

Copyright 2024, cxsecurity.com

 

Back to Top