Vulnerability Description
Multiple interpretation error in Dr.Web 4.32b allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dr.Web | Dr.Web Antivirus | 4.32b |
References
- http://marc.info/?l=bugtraq&m=113026417802703&w=2
- http://www.securityelf.org/magicbyte.html
- http://www.securityelf.org/magicbyteadv.htmlVendor Advisory
- http://www.securityelf.org/updmagic.html
- http://www.securityfocus.com/bid/15189
- http://marc.info/?l=bugtraq&m=113026417802703&w=2
- http://www.securityelf.org/magicbyte.html
- http://www.securityelf.org/magicbyteadv.htmlVendor Advisory
- http://www.securityelf.org/updmagic.html
- http://www.securityfocus.com/bid/15189
FAQ
What is CVE-2005-3373?
CVE-2005-3373 is a vulnerability with a CVSS score of 5.1 (MEDIUM). Multiple interpretation error in Dr.Web 4.32b allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with ...
How severe is CVE-2005-3373?
CVE-2005-3373 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3373?
Check the references section above for vendor advisories and patch information. Affected products include: Dr.Web Dr.Web Antivirus.