First published: Fri May 22 2009(Updated: )
The AVG parsing engine 8.5 323, as used in multiple AVG anti-virus products including Anti-Virus Network Edition, Internet Security Netzwerk Edition, Server Edition für Linux/FreeBSD, Anti-Virus SBS Edition, and others allows remote attackers to bypass malware detection via a crafted (1) RAR and (2) ZIP archive.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AVG AntiVirus | <=8.0.156 | |
AVG AntiVirus | =6.0.710 | |
AVG AntiVirus | =7.0 | |
AVG AntiVirus | =7.0.251 | |
AVG AntiVirus | =7.0.323 | |
AVG AntiVirus | =7.1.308 | |
AVG AntiVirus | =7.1.407 | |
AVG AntiVirus | =7.5.51 | |
AVG AntiVirus | =7.5.448 | |
AVG AntiVirus | =7.5.476 | |
AVG AntiVirus | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1784 is categorized as having a high severity due to its ability to allow remote attackers to bypass malware detection.
To fix CVE-2009-1784, update your AVG Anti-Virus software to the latest version, as older versions are vulnerable.
CVE-2009-1784 affects multiple AVG Anti-Virus versions including 6.0, 7.0, 7.1, 7.5, and versions up to 8.0.156.
CVE-2009-1784 can be exploited through specially crafted RAR files, allowing malware to evade detection.
If you are using AVG Anti-Virus versions prior to the latest updates, your software is at risk from CVE-2009-1784.