ID CVE-2005-3375
Summary Multiple interpretation error in Ikarus demo version allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
References
Vulnerable Configurations
  • cpe:2.3:a:ikarus:ikarus_antivirus:*:*:*:*:*:*:*:*
    cpe:2.3:a:ikarus:ikarus_antivirus:*:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 18-10-2016 - 03:34)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
refmap via4
bid 15189
bugtraq 20051025 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability through
misc
Last major update 18-10-2016 - 03:34
Published 30-10-2005 - 14:34
Last modified 18-10-2016 - 03:34
Back to Top