ID |
CVE-2005-3400
|
Summary |
Multiple interpretation error in Fortinet 2.48.0.0 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug." |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 5.0 (as of 18-10-2016 - 03:35) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
PARTIAL |
NONE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:N/I:P/A:N
|
refmap
via4
|
bugtraq | - 20051025 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability through
- 20051026 Update for the magic byte bug
|
|
Last major update |
18-10-2016 - 03:35 |
Published |
01-11-2005 - 12:47 |
Last modified |
18-10-2016 - 03:35 |