Vulnerability Description
Multiple interpretation error in Kaspersky 5.0.372 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kaspersky Lab | Kaspersky Anti-Virus | 5.0.372 |
References
- http://marc.info/?l=bugtraq&m=113026417802703&w=2
- http://www.securityelf.org/magicbyte.html
- http://www.securityelf.org/magicbyteadv.htmlVendor Advisory
- http://www.securityelf.org/updmagic.html
- http://www.securityfocus.com/bid/15189
- http://marc.info/?l=bugtraq&m=113026417802703&w=2
- http://www.securityelf.org/magicbyte.html
- http://www.securityelf.org/magicbyteadv.htmlVendor Advisory
- http://www.securityelf.org/updmagic.html
- http://www.securityfocus.com/bid/15189
FAQ
What is CVE-2005-3376?
CVE-2005-3376 is a vulnerability with a CVSS score of 5.1 (MEDIUM). Multiple interpretation error in Kaspersky 5.0.372 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated ...
How severe is CVE-2005-3376?
CVE-2005-3376 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3376?
Check the references section above for vendor advisories and patch information. Affected products include: Kaspersky Lab Kaspersky Anti-Virus.