First published: Fri Oct 14 2005(Updated: )
Multiple interpretation error in unspecified versions of Ikarus AntiVirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IKARUS Antivirus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3228 is considered to have a moderate severity level due to its ability to bypass antivirus detection.
To fix CVE-2005-3228, ensure that you are using the latest version of Ikarus AntiVirus, which may contain patches for this vulnerability.
CVE-2005-3228 is associated with remote attacks that exploit malformed RAR files to bypass virus detection.
Multiple unspecified versions of Ikarus AntiVirus are vulnerable to CVE-2005-3228.
CVE-2005-3228 specifically targets RAR files, and other formats like ZIP are not mentioned as being affected.