First published: Fri Nov 19 2004(Updated: )
Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 through 2.4, and EZ-Antivirus 6.1 through 6.3 allow remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ESET NOD32 Antivirus | =1.0.11 | |
Kaspersky Anti-Virus | =4.0 | |
Sophos Small Business Suite | =1.0 | |
Sophos Anti-Virus | =3.83 | |
Perl Archive::Zip | =1.13 | |
McAfee Anti-Malware Scan Engine | =4.3.20 | |
Kaspersky Anti-Virus | =5.0 | |
Broadcom eTrust Antivirus | =7.0_sp2 | |
Sophos Anti-Virus | =3.80 | |
Sophos Anti-Virus | =3.81 | |
ESET NOD32 Antivirus | =1.0.12 | |
Sophos Anti-Virus | =3.86 | |
Sophos Anti-Virus | =3.78 | |
RAV Antivirus Desktop | =8.6 | |
rav Antivirus for mail servers | =8.4.2 | |
rav Antivirus for file servers | =1.0 | |
Sophos Anti-Virus | =3.82 | |
Sophos Anti-Virus | =3.79 | |
Sophos PureMessage Anti-virus | =4.6 | |
Sophos Anti-Virus | =3.78d | |
Sophos Anti-Virus | =3.4.6 | |
Broadcom Secure Content Manager | =1.0-sp1 | |
ESET NOD32 Antivirus | =1.0.13 | |
Sophos Anti-Virus | =3.84 | |
Kaspersky Anti-Virus | =3.0 | |
Sophos Anti-Virus | =3.85 | |
Broadcom ARCserve Backup | =11.1 | |
Broadcom eTrust Antivirus | =7.0 | |
Broadcom eTrust Antivirus | =7.1 | |
CA eTrust Anti-Virus Gateway | =7.0 | |
CA eTrust Anti-Virus Gateway | =7.1 | |
Broadcom eTrust EZ Antivirus | =6.1 | |
Broadcom eTrust EZ Antivirus | =6.2 | |
Broadcom eTrust EZ Antivirus | =6.3 | |
Broadcom eTrust EZ Armor | =2.0 | |
Broadcom eTrust EZ Armor | =2.3 | |
Broadcom eTrust EZ Armor | =2.4 | |
Broadcom eTrust Intrusion Detection | =1.4.1.13 | |
Broadcom eTrust Intrusion Detection | =1.4.5 | |
Broadcom eTrust Intrusion Detection | =1.5 | |
Broadcom Secure Content Manager | =1.0 | |
Broadcom Secure Content Manager | =1.1 | |
Broadcom InoculateIT | =6.0 | |
SUSE Linux | =9.2 | |
Mandrake Linux | =10.1 | |
Gentoo Linux | =1.4 | |
Gentoo Linux | ||
Mandrake Linux | =10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0933 is considered a high severity vulnerability due to its ability to allow remote attackers to bypass antivirus protection.
To fix CVE-2004-0933, it is recommended to upgrade to the latest version of affected software that has addressed this vulnerability.
CVE-2004-0933 affects multiple antivirus solutions including Broadcom eTrust Antivirus, Kaspersky Anti-Virus, and McAfee Antivirus Engine.
Yes, CVE-2004-0933 can be exploited remotely by attackers to bypass antivirus security measures.
There are no specific workarounds for CVE-2004-0933; updating the affected software is the most effective approach.