First published: Fri Nov 04 2005(Updated: )
Frisk F-Prot Antivirus allows remote attackers to bypass protection via a ZIP file with a version header greater than 15, which prevents F-Prot from decompressing and analyzing the file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
F-PROT Antivirus | ||
F-PROT Antivirus | ||
F-PROT Antivirus | ||
F-PROT Antivirus | ||
F-PROT Antivirus | ||
F-PROT Antivirus | =3.12b | |
F-PROT Antivirus | =3.12d | |
F-PROT Antivirus | =3.12d | |
F-PROT Antivirus | =3.16c | |
F-PROT Antivirus | =4.4.2 | |
F-PROT Antivirus | =4.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3499 is considered a moderate severity vulnerability that allows attackers to bypass antivirus protection.
To mitigate CVE-2005-3499, ensure that you are using the latest version of F-Prot Antivirus, as updates may address this vulnerability.
CVE-2005-3499 allows remote attackers to bypass the antivirus protection by using specially crafted ZIP files.
CVE-2005-3499 affects multiple versions of F-Prot Antivirus, including versions 3.12b, 3.12d, and 4.4.2 across different platforms.
CVE-2005-3499 exploits F-Prot Antivirus's inability to process ZIP files with a version header greater than 15, preventing detection of potentially malicious content.