Lucene search

K
cve[email protected]CVE-2005-3373
HistoryOct 30, 2005 - 2:34 p.m.

CVE-2005-3373

2005-10-3014:34:00
web.nvd.nist.gov
22
dr.web 4.32b
remote attackers
virus scanning
cve-2005-3373
interpretation error
magic byte sequence
bypass
security vulnerability
nvd
"magic byte bug"

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

6.9 Medium

AI Score

Confidence

Low

0.01 Low

EPSS

Percentile

83.3%

Multiple interpretation error in Dr.Web 4.32b allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an “MZ” magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a “triple headed” program that contains EXE, EML, and HTML content, aka the “magic byte bug.”

Affected configurations

NVD
Node
dr.webdr.web_antivirusMatch4.32b

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

6.9 Medium

AI Score

Confidence

Low

0.01 Low

EPSS

Percentile

83.3%

Related for CVE-2005-3373