Description
VirusBuster 4.5.11.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
Published: 2008-12-12
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2008-5523 VirusBuster 4.5.11.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
History

No history.

Subscriptions

Microsoft Internet Explorer
Virusbuster Virusbuster
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T10:56:46.664Z

Reserved: 2008-12-12T00:00:00.000Z

Link: CVE-2008-5548

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2008-12-12T18:30:03.217

Modified: 2025-04-09T00:30:58.490

Link: CVE-2008-5548

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses