First published: Fri Dec 12 2008(Updated: )
Sophos Anti-Virus 4.33.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sophos Anti-Virus for Sophos Central macOS | =4.33.0 | |
Internet Explorer | =6 | |
Internet Explorer | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5541 is considered a moderate severity vulnerability due to its ability to bypass malware detection in specific conditions.
To fix CVE-2008-5541, ensure that you are using a version of Sophos Anti-Virus newer than 4.33.0 that addresses this vulnerability.
CVE-2008-5541 exploits the use of Internet Explorer 6 or 7 in conjunction with specific configurations of Sophos Anti-Virus.
Users of Sophos Anti-Virus version 4.33.0 who also use Internet Explorer 6 or 7 are affected by CVE-2008-5541.
CVE-2008-5541 is associated with the ability to bypass detection mechanisms for malware embedded in HTML documents.