The AV engine before DAT 5600 in McAfee VirusScan, Total Protection, Internet Security, SecurityShield for Microsoft ISA Server, Security for Microsoft Sharepoint, Security for Email Servers, Email Gateway, and Active Virus Defense allows remote attackers to bypass virus detection via (1) an invalid Headflags field in a malformed RAR archive, (2) an invalid Packsize field in a malformed RAR archive, or (3) an invalid Filelength field in a malformed ZIP archive.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.zoller.lu/2009/04/mcafee-multiple-bypassesevasions-ziprar.html - | |
References | () http://secunia.com/advisories/34949 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/503173/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/34780 - | |
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10001&actp=LIST_RECENT - Patch, Vendor Advisory |
Information
Published : 2009-04-30 20:30
Updated : 2024-11-21 01:02
NVD link : CVE-2009-1348
Mitre link : CVE-2009-1348
CVE.ORG link : CVE-2009-1348
JSON object : View
Products Affected
mcafee
- total_protection
- virusscan_enterprise
- total_protection_for_endpoint
- virusscan_plus
- securityshield_for_microsoft_isa_server
- email_gateway
- active_virusscan
- securityshield_for_microsoft_sharepoint
- internet_security_suite
- securityshield_for_email_servers
- virusscan_commandline
- active_virus_defense
- virusscan_usb
CWE
CWE-20
Improper Input Validation