ID CVE-2005-3372
Summary Multiple interpretation error in eTrust CA 7.0.1.4 with the 11.9.1 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
References
Vulnerable Configurations
  • cpe:2.3:a:broadcom:etrust_antivirus:7.0.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:etrust_antivirus:7.0.1.4:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 09-04-2021 - 13:52)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
refmap via4
bid 15189
bugtraq 20051025 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability through
misc
Last major update 09-04-2021 - 13:52
Published 30-10-2005 - 14:34
Last modified 09-04-2021 - 13:52
Back to Top