Ikarus Virus Utilities T3.1.1.45.0 and possibly T3.1.1.34.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 00:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/4723 - | |
References | () http://www.securityfocus.com/archive/1/498995/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/499043/100/0/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/47435 - |
Information
Published : 2008-12-12 18:30
Updated : 2024-11-21 00:54
NVD link : CVE-2008-5532
Mitre link : CVE-2008-5532
CVE.ORG link : CVE-2008-5532
JSON object : View
Products Affected
microsoft
- internet_explorer
ikarus
- ikarus_antivirus
CWE
CWE-20
Improper Input Validation