Lucene search

K
cve[email protected]CVE-2005-3376
HistoryOct 30, 2005 - 2:34 p.m.

CVE-2005-3376

2005-10-3014:34:00
NVD-CWE-Other
web.nvd.nist.gov
19
kaspersky
bypass
virus scanning
cve-2005-3376
security
exploit

7.4 High

AI Score

Confidence

Low

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

81.7%

Multiple interpretation error in Kaspersky 5.0.372 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an “MZ” magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a “triple headed” program that contains EXE, EML, and HTML content, aka the “magic byte bug.”

7.4 High

AI Score

Confidence

Low

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

81.7%

Related for CVE-2005-3376