Vulnerability Description
Secure Computing Secure Web Gateway (aka Webwasher), when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Secure Computing | Secure Web Gateway | All versions |
| Secure Computing | Webwasher | All versions |
| Microsoft | Internet Explorer | 6 |
Related Weaknesses (CWE)
References
- http://securityreason.com/securityalert/4723
- http://www.securityfocus.com/archive/1/498995/100/0/threaded
- http://www.securityfocus.com/archive/1/499043/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47435
- http://securityreason.com/securityalert/4723
- http://www.securityfocus.com/archive/1/498995/100/0/threaded
- http://www.securityfocus.com/archive/1/499043/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47435
FAQ
What is CVE-2008-5540?
CVE-2008-5540 is a vulnerability with a CVSS score of 9.3 (HIGH). Secure Computing Secure Web Gateway (aka Webwasher), when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE...
How severe is CVE-2008-5540?
CVE-2008-5540 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-5540?
Check the references section above for vendor advisories and patch information. Affected products include: Secure Computing Secure Web Gateway, Secure Computing Webwasher, Microsoft Internet Explorer.