Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2005-3373

Overview

Vulnerability Score 5.1 5.1
CVE Id CVE-2005-3373
Last Modified 05 Sep 2008 04:54:12
Published 30 Oct 2005 09:34:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity HIGH
Authentication NONE

CVE-2005-3373

Summary

Multiple interpretation error in Dr.Web 4.32b allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."

Vulnerable Systems

Application

  • Dr.web Antivirus 4.32b


References

MISC - http://www.securityelf.org/updmagic.html

MISC - http://www.securityelf.org/magicbyteadv.html

MISC - http://www.securityelf.org/magicbyte.html

BUGTRAQ - 20051025 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability through

BID - 15189


Last Updated: 27 May 2016 10:40:54