First published: Fri Dec 12 2008(Updated: )
Fortinet Antivirus 3.113.0.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Antivirus | =3.113.0.0 | |
Internet Explorer | =6 | |
Internet Explorer | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5531 is considered to be a moderate severity vulnerability due to its potential to allow malware bypass.
To mitigate CVE-2008-5531, ensure that Fortinet Antivirus is updated to a newer version that addresses this vulnerability.
CVE-2008-5531 affects Fortinet Antivirus 3.113.0.0 when used in conjunction with Internet Explorer 6 and 7.
Yes, CVE-2008-5531 can be exploited remotely by attackers to bypass malware detection.
CVE-2008-5531 involves an attack that manipulates file headers and extensions to evade antivirus detection.