Description
VirusBlokAda VBA32 3.12.8.5, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
Published: 2008-12-12
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2008-5521 VirusBlokAda VBA32 3.12.8.5, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
History

No history.

Subscriptions

Microsoft Internet Explorer
Virusblokada Vba32 Antivirus
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T10:56:46.423Z

Reserved: 2008-12-12T00:00:00.000Z

Link: CVE-2008-5546

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2008-12-12T18:30:03.170

Modified: 2025-04-09T00:30:58.490

Link: CVE-2008-5546

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses