First published: Fri Dec 12 2008(Updated: )
VirusBuster 4.5.11.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VirusBuster | =4.5.11.0 | |
Internet Explorer | =6 | |
Internet Explorer | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5548 has a medium severity level due to its ability to allow malware to bypass detection.
To fix CVE-2008-5548, ensure you are using an updated version of VirusBuster that addresses this vulnerability.
CVE-2008-5548 specifically affects VirusBuster version 4.5.11.0.
CVE-2008-5548 involves Internet Explorer versions 6 and 7.
CVE-2008-5548 can be exploited using files with no extension, .txt, or .jpg extensions.