VirusBlokAda VBA32 3.12.8.5, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
References
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2008-12-12 10:30
Updated : 2018-10-11 13:56
NVD link : CVE-2008-5546
Mitre link : CVE-2008-5546
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
virusblokada
- vba32_antivirus
microsoft
- internet_explorer