First published: Fri Dec 12 2008(Updated: )
RISING Antivirus 21.06.31.00 and possibly 20.61.42.00, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rising Antivirus | =20.61.42.00 | |
Rising Antivirus | =21.06.31.00 | |
Internet Explorer | =6 | |
Internet Explorer | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5539 is considered a medium-severity vulnerability due to its ability to bypass malware detection.
To mitigate CVE-2008-5539, users should update to the latest version of Rising Antivirus and ensure proper use of file extensions.
CVE-2008-5539 affects Rising Antivirus versions 20.61.42.00 and 21.06.31.00 when used with Internet Explorer 6 or 7.
The impact of CVE-2008-5539 allows remote attackers to evade detection of malware in HTML documents.
Yes, CVE-2008-5539 can be exploited by sending malicious HTML files via email that are crafted to bypass antivirus scanning.