First published: Fri Oct 14 2005(Updated: )
Multiple interpretation error in unspecified versions of ClamAV Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ClamXAV | =0.90.2 | |
ClamXAV | =0.90.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3229 is considered a high severity vulnerability due to its ability for malicious executables to bypass virus detection.
To fix CVE-2005-3229, update your ClamAV Antivirus to a version that addresses this vulnerability.
CVE-2005-3229 can be exploited through specially crafted RAR files with malformed central and local headers.
CVE-2005-3229 affects unspecified versions of ClamAV, notably version 0.90.2.
The risks associated with CVE-2005-3229 include the possibility of executing malicious code undetected, leading to system compromise.