DELETED --
DELETED SPECIFIC-THREATS Multiple vendor Antivirus magic byte detection evasion attempt
Multiple interpretation error in ArcaVir 2005 package 2005-06-21 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug." Impact: CVSS base score 5.1 CVSS impact score 6.4 CVSS exploitability score 4.9 confidentialityImpact PARTIAL integrityImpact PARTIAL availabilityImpact PARTIAL Details: Ease of Attack:
No information provided
No public information
No known false positives
Talos research team. This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology. For more information see [nvd].
No rule groups
CVE-2005-3370 |
Loading description
|
CVE-2005-3371 |
Loading description
|
CVE-2005-3372 |
Loading description
|
CVE-2005-3373 |
Loading description
|
CVE-2005-3374 |
Loading description
|
CVE-2005-3375 |
Loading description
|
CVE-2005-3376 |
Loading description
|
CVE-2005-3377 |
Loading description
|
CVE-2005-3378 |
Loading description
|
CVE-2005-3379 |
Loading description
|
CVE-2005-3380 |
Loading description
|
CVE-2005-3381 |
Loading description
|
CVE-2005-3382 |
Loading description
|