First published: Fri Oct 14 2005(Updated: )
Multiple interpretation error in unspecified versions of (1) eTrust-Iris and (2) eTrust-Vet Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom eTrust Antivirus | ||
Broadcom eTrust Antivirus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3225 is considered a medium severity vulnerability due to its ability to allow attackers to bypass virus detection.
To fix CVE-2005-3225, ensure that you are using the latest version of Broadcom eTrust Antivirus or eTrust-Iris Engine which addresses this vulnerability.
CVE-2005-3225 affects Broadcom eTrust Antivirus and Broadcom eTrust Antivirus Iris Engine.
Yes, CVE-2005-3225 can be exploited remotely by attackers using specially crafted RAR files.
CVE-2005-3225 involves a malicious executable embedded in a malformed RAR file that bypasses antivirus detection.