Lucene search

K
cveMitreCVE-2005-3372
HistoryOct 30, 2005 - 2:34 p.m.

CVE-2005-3372

2005-10-3014:34:00
mitre
web.nvd.nist.gov
31
cve-2005-3372
etrust ca
interpretation error
remote attackers
virus scanning
bypass
mz magic byte
exe
bat
html
eml
dangerous file
nvd

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

AI Score

6.9

Confidence

Low

EPSS

0.012

Percentile

85.6%

Multiple interpretation error in eTrust CA 7.0.1.4 with the 11.9.1 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an “MZ” magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a “triple headed” program that contains EXE, EML, and HTML content, aka the “magic byte bug.”

Affected configurations

Nvd
Node
broadcometrust_antivirusMatch7.0.1.4
VendorProductVersionCPE
broadcometrust_antivirus7.0.1.4cpe:2.3:a:broadcom:etrust_antivirus:7.0.1.4:*:*:*:*:*:*:*

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

AI Score

6.9

Confidence

Low

EPSS

0.012

Percentile

85.6%

Related for CVE-2005-3372