First published: Fri Dec 12 2008(Updated: )
AVG Anti-Virus 8.0.0.161, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AVG Antivirus Plus Firewall | =8.0.0.161 | |
Internet Explorer | =6 | |
Internet Explorer | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5522 is considered a medium severity vulnerability as it allows remote attackers to bypass malware detection.
To mitigate CVE-2008-5522, upgrade AVG Anti-Virus to a version that addresses this vulnerability.
AVG Anti-Virus version 8.0.0.161 is specifically affected by CVE-2008-5522.
Yes, CVE-2008-5522 can be exploited when using Internet Explorer 6 or 7.
CVE-2008-5522 involves file extensions such as no extension, .txt, and .jpg, which can be modified for exploitation.