First published: Sat Oct 29 2005(Updated: )
Multiple interpretation error in (1) McAfee Internet Security Suite 7.1.5 version 9.1.08 with the 4.4.00 engine and (2) McAfee Corporate 8.0.0 patch 10 with the 4400 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee Internet Security Suite | =7.1.5_version_9.1.08_engine_4.4.00 | |
McAfee Internet Security Suite | =8.0.0_patch_10_engine_4400 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3377 has a moderate severity level due to its ability to bypass virus scanning in affected McAfee products.
To fix CVE-2005-3377, users should update their McAfee Internet Security Suite to the latest version provided by McAfee.
CVE-2005-3377 affects McAfee Internet Security Suite version 7.1.5 with engine 4.4.00 and version 8.0.0 with patch 10.
CVE-2005-3377 does not directly allow remote code execution, but it enables attackers to bypass virus detection which could lead to further exploits.
CVE-2005-3377 takes advantage of files such as BAT, HTML, and EML that contain an "MZ" magic byte sequence.