First published: Fri Dec 12 2008(Updated: )
avast! antivirus 4.8.1281.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avast Antivirus | =4.8.1281.0 | |
Internet Explorer | =6 | |
Internet Explorer | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5523 is considered to have a moderate severity level as it allows attackers to bypass malware detection.
To fix CVE-2008-5523, users should update to a later version of avast! antivirus that addresses this vulnerability.
CVE-2008-5523 specifically affects Avast Antivirus version 4.8.1281.0 when used with Internet Explorer 6 or 7.
No, CVE-2008-5523 is specific to Internet Explorer 6 and 7, so using a different browser mitigates the risk.
CVE-2008-5523 involves a technique where attackers can manipulate the file extension and headers to bypass detection of malware.