Kaspersky 3.x to 4.x allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
References
Link | Resource |
---|---|
http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true | |
http://www.kb.cert.org/vuls/id/968818 | US Government Resource |
http://www.securityfocus.com/bid/11448 | Exploit Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2005-01-27 05:00
Updated : 2024-02-28 10:42
NVD link : CVE-2004-0934
Mitre link : CVE-2004-0934
CVE.ORG link : CVE-2004-0934
JSON object : View
Products Affected
ca
- etrust_secure_content_manager
- etrust_antivirus
sophos
- sophos_small_business_suite
- sophos_anti-virus
- sophos_puremessage_anti-virus
broadcom
- etrust_secure_content_manager
- etrust_ez_armor
- etrust_intrusion_detection
- inoculateit
- etrust_ez_antivirus
- etrust_antivirus
- etrust_antivirus_gateway
- brightstor_arcserve_backup
archive_zip
- archive_zip
kaspersky_lab
- kaspersky_anti-virus
rav_antivirus
- rav_antivirus_for_file_servers
- rav_antivirus_for_mail_servers
- rav_antivirus_desktop
mandrakesoft
- mandrake_linux
eset_software
- nod32_antivirus
suse
- suse_linux
gentoo
- linux
mcafee
- antivirus_engine
CWE