// For flags

CVE-2005-3377

 

Severity Score

5.1
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple interpretation error in (1) McAfee Internet Security Suite 7.1.5 version 9.1.08 with the 4.4.00 engine and (2) McAfee Corporate 8.0.0 patch 10 with the 4400 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2005-10-29 CVE Reserved
  • 2005-10-29 CVE Published
  • 2024-02-18 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mcafee
Search vendor "Mcafee"
Internet Security Suite
Search vendor "Mcafee" for product "Internet Security Suite"
7.1.5_version_9.1.08_engine_4.4.00
Search vendor "Mcafee" for product "Internet Security Suite" and version "7.1.5_version_9.1.08_engine_4.4.00"
-
Affected
Mcafee
Search vendor "Mcafee"
Internet Security Suite
Search vendor "Mcafee" for product "Internet Security Suite"
8.0.0_patch_10_engine_4400
Search vendor "Mcafee" for product "Internet Security Suite" and version "8.0.0_patch_10_engine_4400"
-
Affected