var-200412-0351
Vulnerability from variot
Multiple interpretation error in various F-Secure Anti-Virus products, including Workstation 5.43 and earlier, Windows Servers 5.50 and earlier, MIMEsweeper 5.50 and earlier, Anti-Virus for Linux Servers and Gateways 4.61 and earlier, and other products, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on the target system. Anti-virus software may rely on corrupted headers to determine if a zip archive is valid. As a result, anti-virus software may fail to detect malicious content within a zip archive. It is reported that the software does not filter certain ZIP archives. Exploitation of this vulnerability may result in a false sense of security and in the execution of malicious applications. The vulnerability does not prevent compressed files from being opened on the target system. TITLE: F-Secure Products Zip Archive Virus Detection Bypass Vulnerability
SECUNIA ADVISORY ID: SA13263
VERIFY ADVISORY: http://secunia.com/advisories/13263/
CRITICAL: Moderately critical
IMPACT: Security Bypass
WHERE:
From remote
SOFTWARE: F-Secure Internet Security 2005 http://secunia.com/product/4300/ F-Secure Internet Security 2004 http://secunia.com/product/3499/ F-Secure Internet Gatekeeper 6.x http://secunia.com/product/3339/ F-Secure Anti-Virus for Workstations 5.x http://secunia.com/product/457/ F-Secure Anti-Virus for Samba Servers 4.x http://secunia.com/product/3501/ F-Secure Anti-Virus for MIMEsweeper 5.x http://secunia.com/product/455/ F-Secure Anti-Virus for Microsoft Exchange 6.x http://secunia.com/product/454/ F-Secure Anti-Virus for Linux 4.x http://secunia.com/product/3165/ F-Secure Anti-Virus for Firewalls 6.x http://secunia.com/product/451/ F-Secure Anti-Virus Client Security 5.x http://secunia.com/product/2718/ F-Secure Anti-Virus 5.x http://secunia.com/product/3334/ F-Secure Anti-Virus 2005 http://secunia.com/product/4299/ F-Secure Anti-Virus 2004 http://secunia.com/product/3500/
DESCRIPTION: A vulnerability has been reported in various F-Secure products, which can be exploited by malware to bypass certain scanning functionality.
The vulnerability is caused due to an error when parsing ".zip" archives and can be exploited via a specially crafted ".zip" archive, which the scanner incorrectly calculates be of zero length.
Successful exploitation causes malware in a specially crafted ".zip" archive to bypass the scanning functionality.
NOTE: This is not a critical issue on client systems, as the malware still is detected when it is extracted.
PROVIDED AND/OR DISCOVERED BY: Reported by vendor.
ORIGINAL ADVISORY: http://www.f-secure.com/security/fsc-2004-3.shtml
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200412-0351", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.6, "vendor": "f secure", "version": "2004" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.6, "vendor": "f secure", "version": "4.52" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.6, "vendor": "f secure", "version": "4.51" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.6, "vendor": "f secure", "version": "2005" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.6, "vendor": "f secure", "version": "4.60" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.6, "vendor": "f secure", "version": "5.41" }, { "model": "f-secure for firewalls", "scope": "eq", "trust": 1.3, "vendor": "f secure", "version": "6.20" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 1.3, "vendor": "f secure", "version": "6.41" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 1.3, "vendor": "f secure", "version": "6.32" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 1.3, "vendor": "f secure", "version": "6.31" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 1.3, "vendor": "f secure", "version": "6.3" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "5.0" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "5.43" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "4.61" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "6.30_sr1" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "6.31" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "5.5" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "6.30" }, { "model": "f-secure personal express", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "4.5" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "6.21" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "6.2" }, { "model": "f-secure internet security", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "2005" }, { "model": "f-secure internet security", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "2004" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "6.01" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "5.55" }, { "model": "f-secure personal express", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "5.0" }, { "model": "f-secure personal express", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "4.7" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "6.4" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "5.52" }, { "model": "f-secure personal express", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "4.6" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "2.6" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "5.42" }, { "model": "internet gatekeeper for linux", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2.6" }, { "model": "anti-virus client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.52" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.2" }, { "model": "anti-virus for workstations", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.43" }, { "model": "personal express", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.7" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2005" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.21" }, { "model": "anti-virus for windows servers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.41" }, { "model": "anti-virus for linux gateways", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.61" }, { "model": "anti-virus for windows servers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.42" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2004" }, { "model": "anti-virus for linux servers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.61" }, { "model": "personal express", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.5" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.31" }, { "model": "anti-virus for samba servers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.60" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.01" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.400" }, { "model": "personal express", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.0" }, { "model": "anti-virus for linux gateways", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.52" }, { "model": "anti-virus for linux servers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.52" }, { "model": "anti-virus client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.55" }, { "model": "anti-virus for ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.30" }, { "model": "anti-virus linux client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.0" }, { "model": "anti-virus for ms exchange service release", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.301" }, { "model": "internet security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2005" }, { "model": "internet security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "2004" }, { "model": "anti-virus for mimesweeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.50" }, { "model": "anti-virus for linux gateways", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.51" }, { "model": "anti-virus for linux workstations", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.52" }, { "model": "anti-virus for linux servers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.51" }, { "model": "anti-virus for linux workstations", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.51" }, { "model": "anti-virus for workstations", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.41" }, { "model": "personal express", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "4.6" }, { "model": "anti-virus for mimesweeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.41" }, { "model": "anti-virus linux server security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.0" }, { "model": "anti-virus for workstations", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.42" }, { "model": "anti-virus client security", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.50" }, { "model": "anti-virus for mimesweeper", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.42" }, { "model": "anti-virus for windows servers", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "5.50" } ], "sources": [ { "db": "BID", "id": "11732" }, { "db": "CNNVD", "id": "CNNVD-200412-1124" }, { "db": "NVD", "id": "CVE-2004-2442" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "F-Secure", "sources": [ { "db": "CNNVD", "id": "CNNVD-200412-1124" } ], "trust": 0.6 }, "cve": "CVE-2004-2442", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2004-2442", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-10870", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2004-2442", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#968818", "trust": 0.8, "value": "7.59" }, { "author": "CNNVD", "id": "CNNVD-200412-1124", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-10870", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-10870" }, { "db": "CNNVD", "id": "CNNVD-200412-1124" }, { "db": "NVD", "id": "CVE-2004-2442" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple interpretation error in various F-Secure Anti-Virus products, including Workstation 5.43 and earlier, Windows Servers 5.50 and earlier, MIMEsweeper 5.50 and earlier, Anti-Virus for Linux Servers and Gateways 4.61 and earlier, and other products, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on the target system. Anti-virus software may rely on corrupted headers to determine if a zip archive is valid. As a result, anti-virus software may fail to detect malicious content within a zip archive. It is reported that the software does not filter certain ZIP archives. \nExploitation of this vulnerability may result in a false sense of security and in the execution of malicious applications. The vulnerability does not prevent compressed files from being opened on the target system. \nTITLE:\nF-Secure Products Zip Archive Virus Detection Bypass Vulnerability\n\nSECUNIA ADVISORY ID:\nSA13263\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/13263/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSecurity Bypass\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nF-Secure Internet Security 2005\nhttp://secunia.com/product/4300/\nF-Secure Internet Security 2004\nhttp://secunia.com/product/3499/\nF-Secure Internet Gatekeeper 6.x\nhttp://secunia.com/product/3339/\nF-Secure Anti-Virus for Workstations 5.x\nhttp://secunia.com/product/457/\nF-Secure Anti-Virus for Samba Servers 4.x\nhttp://secunia.com/product/3501/\nF-Secure Anti-Virus for MIMEsweeper 5.x\nhttp://secunia.com/product/455/\nF-Secure Anti-Virus for Microsoft Exchange 6.x\nhttp://secunia.com/product/454/\nF-Secure Anti-Virus for Linux 4.x\nhttp://secunia.com/product/3165/\nF-Secure Anti-Virus for Firewalls 6.x\nhttp://secunia.com/product/451/\nF-Secure Anti-Virus Client Security 5.x\nhttp://secunia.com/product/2718/\nF-Secure Anti-Virus 5.x\nhttp://secunia.com/product/3334/\nF-Secure Anti-Virus 2005\nhttp://secunia.com/product/4299/\nF-Secure Anti-Virus 2004\nhttp://secunia.com/product/3500/\n\nDESCRIPTION:\nA vulnerability has been reported in various F-Secure products, which\ncan be exploited by malware to bypass certain scanning functionality. \n\nThe vulnerability is caused due to an error when parsing \".zip\"\narchives and can be exploited via a specially crafted \".zip\" archive,\nwhich the scanner incorrectly calculates be of zero length. \n\nSuccessful exploitation causes malware in a specially crafted \".zip\"\narchive to bypass the scanning functionality. \n\nNOTE: This is not a critical issue on client systems, as the malware\nstill is detected when it is extracted. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by vendor. \n\nORIGINAL ADVISORY:\nhttp://www.f-secure.com/security/fsc-2004-3.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n", "sources": [ { "db": "NVD", "id": "CVE-2004-2442" }, { "db": "CERT/CC", "id": "VU#968818" }, { "db": "BID", "id": "11732" }, { "db": "VULHUB", "id": "VHN-10870" }, { "db": "PACKETSTORM", "id": "35148" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-10870", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-10870" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#968818", "trust": 2.5 }, { "db": "BID", "id": "11732", "trust": 2.0 }, { "db": "SECUNIA", "id": "13263", "trust": 1.8 }, { "db": "NVD", "id": "CVE-2004-2442", "trust": 1.7 }, { "db": "CIAC", "id": "P-041", "trust": 0.6 }, { "db": "XF", "id": "18217", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200412-1124", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "629", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-10870", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "35148", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-10870" }, { "db": "BID", "id": "11732" }, { "db": "PACKETSTORM", "id": "35148" }, { "db": "CNNVD", "id": "CNNVD-200412-1124" }, { "db": "NVD", "id": "CVE-2004-2442" } ] }, "id": "VAR-200412-0351", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-10870" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:58:04.367000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-2442" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://www.f-secure.com/security/fsc-2004-3.shtml" }, { "trust": 1.8, "url": "http://secunia.com/advisories/13263/" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/11732" }, { "trust": 1.7, "url": "http://www.kb.cert.org/vuls/id/968818" }, { "trust": 1.7, "url": "http://www.ciac.org/ciac/bulletins/p-041.shtml" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18217" }, { "trust": 0.8, "url": "http://www.linuxsecurity.com/advisories/gentoo_advisory-5043.html" }, { "trust": 0.8, "url": "http://rt.cpan.org/noauth/bug.html?id=8077" }, { "trust": 0.8, "url": "http://www.idefense.com/application/poi/display?id=153" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/18217" }, { "trust": 0.1, "url": "http://secunia.com/product/457/" }, { "trust": 0.1, "url": "http://secunia.com/product/454/" }, { "trust": 0.1, "url": "http://secunia.com/product/3500/" }, { "trust": 0.1, "url": "http://secunia.com/product/4300/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/3334/" }, { "trust": 0.1, "url": "http://secunia.com/product/3501/" }, { "trust": 0.1, "url": "http://secunia.com/product/3339/" }, { "trust": 0.1, "url": "http://secunia.com/product/3165/" }, { "trust": 0.1, "url": "http://secunia.com/product/3499/" }, { "trust": 0.1, "url": "http://secunia.com/product/451/" }, { "trust": 0.1, "url": "http://secunia.com/product/455/" }, { "trust": 0.1, "url": "http://secunia.com/product/2718/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/4299/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-10870" }, { "db": "BID", "id": "11732" }, { "db": "PACKETSTORM", "id": "35148" }, { "db": "CNNVD", "id": "CNNVD-200412-1124" }, { "db": "NVD", "id": "CVE-2004-2442" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-10870" }, { "db": "BID", "id": "11732" }, { "db": "PACKETSTORM", "id": "35148" }, { "db": "CNNVD", "id": "CNNVD-200412-1124" }, { "db": "NVD", "id": "CVE-2004-2442" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-12-10T00:00:00", "db": "CERT/CC", "id": "VU#968818" }, { "date": "2004-12-31T00:00:00", "db": "VULHUB", "id": "VHN-10870" }, { "date": "2004-11-23T00:00:00", "db": "BID", "id": "11732" }, { "date": "2004-12-11T18:49:21", "db": "PACKETSTORM", "id": "35148" }, { "date": "2004-12-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200412-1124" }, { "date": "2004-12-31T05:00:00", "db": "NVD", "id": "CVE-2004-2442" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-01-14T00:00:00", "db": "CERT/CC", "id": "VU#968818" }, { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-10870" }, { "date": "2004-11-23T00:00:00", "db": "BID", "id": "11732" }, { "date": "2006-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200412-1124" }, { "date": "2024-11-20T23:53:21.973000", "db": "NVD", "id": "CVE-2004-2442" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200412-1124" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "F-Secure Anti-Virus ZIP Archive Scanner Bypass Vulnerability", "sources": [ { "db": "BID", "id": "11732" }, { "db": "CNNVD", "id": "CNNVD-200412-1124" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200412-1124" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.