First published: Fri Dec 12 2008(Updated: )
VirusBlokAda VBA32 3.12.8.5, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VirusBlokAda VBA32 | =3.12.8.5 | |
Internet Explorer | =6 | |
Internet Explorer | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5546 is considered a moderately severe vulnerability due to its ability to allow malware to bypass detection.
CVE-2008-5546 exploits Internet Explorer by allowing attackers to place an MZ header at the beginning of an HTML document to bypass malware detection.
CVE-2008-5546 specifically affects VirusBlokAda VBA32 version 3.12.8.5.
Yes, attackers can bypass detection in CVE-2008-5546 by changing the file extension to .txt or .jpg.
To fix CVE-2008-5546, it is recommended to update VirusBlokAda VBA32 to the latest version or consider switching to a more secure antivirus solution.