Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2005-3379

Overview

Vulnerability Score 5.1 5.1
CVE Id CVE-2005-3379
Last Modified 05 Sep 2008 04:54:13
Published 30 Oct 2005 09:34:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity HIGH
Authentication NONE

CVE-2005-3379

Summary

Multiple interpretation error in Trend Micro (1) PC-Cillin 2005 12.0.1244 with the 7.510.1002 engine and (2) OfficeScan 7.0 with the 7.510.1002 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."

Vulnerable Systems

Application

  • Trend Micro Officescan 7.0 Engine 7.510.1002

  • Trend Micro Pc-cillin 2005 12.0.1244 Engine 7.510.1002


References

MISC - http://www.securityelf.org/updmagic.html

MISC - http://www.securityelf.org/magicbyteadv.html

MISC - http://www.securityelf.org/magicbyte.html

BUGTRAQ - 20051025 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability through

BID - 15189

BUGTRAQ - 20051029 Trend Micro's Response to the Magic Byte Bug


Last Updated: 27 May 2016 10:40:54