First published: Fri Dec 12 2008(Updated: )
ESET Smart Security, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ESET Smart Security for Windows | =3.0 | |
Internet Explorer | =6 | |
Internet Explorer | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5527 has a moderate severity level that allows potential malware to bypass detection mechanisms.
CVE-2008-5527 affects ESET Smart Security 3.0 when used in conjunction with Internet Explorer 6 and 7.
To address CVE-2008-5527, it is recommended to update ESET Smart Security to the latest version that resolves this vulnerability.
Yes, CVE-2008-5527 exploits vulnerabilities by manipulating file extensions, allowing executable files to masquerade as non-executable formats.
No, CVE-2008-5527 specifically affects Internet Explorer versions 6 and 7, and later versions are not vulnerable.