Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2005-3376

Overview

Vulnerability Score 5.1 5.1
CVE Id CVE-2005-3376
Last Modified 07 Mar 2011 09:26:26
Published 30 Oct 2005 09:34:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity HIGH
Authentication NONE

CVE-2005-3376

Summary

Multiple interpretation error in Kaspersky 5.0.372 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."

Vulnerable Systems

Application

  • Kaspersky Lab Kaspersky Anti-virus 5.0.372


References

BID - 15189

MISC - http://www.securityelf.org/updmagic.html

MISC - http://www.securityelf.org/magicbyteadv.html

MISC - http://www.securityelf.org/magicbyte.html

BUGTRAQ - 20051025 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability through


Last Updated: 27 May 2016 10:40:54