ID CVE-2005-3400
Summary Multiple interpretation error in Fortinet 2.48.0.0 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
References
Vulnerable Configurations
  • cpe:2.3:h:fortinet:fortinet:2.48.0.0:*:*:*:*:*:*:*
    cpe:2.3:h:fortinet:fortinet:2.48.0.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 18-10-2016 - 03:35)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
bugtraq
  • 20051025 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability through
  • 20051026 Update for the magic byte bug
Last major update 18-10-2016 - 03:35
Published 01-11-2005 - 12:47
Last modified 18-10-2016 - 03:35
Back to Top