CVE-2008-5545

Trend Micro VSAPI 8.700.0.1004 in Trend Micro AntiVirus, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:trend_micro:trend_micro_antivirus:8.700.0.1004:*:*:*:*:*:*:*
OR cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*

History

21 Nov 2024, 00:54

Type Values Removed Values Added
References () http://securityreason.com/securityalert/4723 - () http://securityreason.com/securityalert/4723 -
References () http://www.securityfocus.com/archive/1/498995/100/0/threaded - () http://www.securityfocus.com/archive/1/498995/100/0/threaded -
References () http://www.securityfocus.com/archive/1/499043/100/0/threaded - () http://www.securityfocus.com/archive/1/499043/100/0/threaded -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/47435 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/47435 -

Information

Published : 2008-12-12 18:30

Updated : 2024-11-21 00:54


NVD link : CVE-2008-5545

Mitre link : CVE-2008-5545

CVE.ORG link : CVE-2008-5545


JSON object : View

Products Affected

microsoft

  • internet_explorer

trend_micro

  • trend_micro_antivirus
CWE
CWE-20

Improper Input Validation