First published: Fri Dec 12 2008(Updated: )
Trend Micro VSAPI 8.700.0.1004 in Trend Micro AntiVirus, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Antivirus | =8.700.0.1004 | |
Internet Explorer | =6 | |
Internet Explorer | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5545 is considered a high-severity vulnerability due to its ability to bypass malware detection.
To mitigate CVE-2008-5545, update Trend Micro AntiVirus to a version that addresses this vulnerability.
CVE-2008-5545 specifically affects Trend Micro AntiVirus version 8.700.0.1004.
Yes, CVE-2008-5545 can be exploited when using Internet Explorer 6 or 7 to open HTML documents containing malicious content.
CVE-2008-5545 primarily affects Trend Micro AntiVirus and is not directly linked to vulnerabilities in other software.