First published: Fri Dec 12 2008(Updated: )
Aladdin eSafe 7.0.17.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Aladdin eSafe | =7.0.17.0 | |
Internet Explorer | =6 | |
Internet Explorer | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5528 is classified as a medium severity vulnerability due to its ability to bypass malware detection.
CVE-2008-5528 exploits Aladdin eSafe by allowing remote attackers to bypass detection through specific file modifications.
CVE-2008-5528 specifically affects Aladdin eSafe version 7.0.17.0.
Yes, CVE-2008-5528 can be exploited by using files with no extension, .txt, or .jpg extensions.
The best mitigation for CVE-2008-5528 is to update to a patched version of the Aladdin eSafe software.