Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2006-0338

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-21 Jan, 2006 | 00:00
Updated At-07 Aug, 2024 | 16:34
Rejected At-
Credits

Multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allow remote attackers to hide arbitrary files and data via malformed (1) RAR and (2) ZIP archives, which are not properly scanned.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:21 Jan, 2006 | 00:00
Updated At:07 Aug, 2024 | 16:34
Rejected At:
â–¼CVE Numbering Authority (CNA)

Multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allow remote attackers to hide arbitrary files and data via malformed (1) RAR and (2) ZIP archives, which are not properly scanned.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.f-secure.com/security/fsc-2006-1.shtml
x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/24199
vdb-entry
x_refsource_XF
http://securitytracker.com/id?1015510
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/18529
third-party-advisory
x_refsource_SECUNIA
http://www.osvdb.org/22633
vdb-entry
x_refsource_OSVDB
http://securitytracker.com/id?1015509
vdb-entry
x_refsource_SECTRACK
http://www.securityfocus.com/bid/16309
vdb-entry
x_refsource_BID
http://www.ciac.org/ciac/bulletins/q-103.shtml
third-party-advisory
government-resource
x_refsource_CIAC
http://securitytracker.com/id?1015508
vdb-entry
x_refsource_SECTRACK
http://securitytracker.com/id?1015507
vdb-entry
x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/0257
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.f-secure.com/security/fsc-2006-1.shtml
Resource:
x_refsource_CONFIRM
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24199
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://securitytracker.com/id?1015510
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/18529
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.osvdb.org/22633
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://securitytracker.com/id?1015509
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.securityfocus.com/bid/16309
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.ciac.org/ciac/bulletins/q-103.shtml
Resource:
third-party-advisory
government-resource
x_refsource_CIAC
Hyperlink: http://securitytracker.com/id?1015508
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://securitytracker.com/id?1015507
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vupen.com/english/advisories/2006/0257
Resource:
vdb-entry
x_refsource_VUPEN
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.f-secure.com/security/fsc-2006-1.shtml
x_refsource_CONFIRM
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/24199
vdb-entry
x_refsource_XF
x_transferred
http://securitytracker.com/id?1015510
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/18529
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.osvdb.org/22633
vdb-entry
x_refsource_OSVDB
x_transferred
http://securitytracker.com/id?1015509
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.securityfocus.com/bid/16309
vdb-entry
x_refsource_BID
x_transferred
http://www.ciac.org/ciac/bulletins/q-103.shtml
third-party-advisory
government-resource
x_refsource_CIAC
x_transferred
http://securitytracker.com/id?1015508
vdb-entry
x_refsource_SECTRACK
x_transferred
http://securitytracker.com/id?1015507
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vupen.com/english/advisories/2006/0257
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.f-secure.com/security/fsc-2006-1.shtml
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24199
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://securitytracker.com/id?1015510
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/18529
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.osvdb.org/22633
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://securitytracker.com/id?1015509
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.securityfocus.com/bid/16309
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.ciac.org/ciac/bulletins/q-103.shtml
Resource:
third-party-advisory
government-resource
x_refsource_CIAC
x_transferred
Hyperlink: http://securitytracker.com/id?1015508
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://securitytracker.com/id?1015507
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/0257
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:21 Jan, 2006 | 00:03
Updated At:03 Apr, 2025 | 01:03

Multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allow remote attackers to hide arbitrary files and data via malformed (1) RAR and (2) ZIP archives, which are not properly scanned.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
CPE Matches

F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.51
cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.51
cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.52
cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.52
cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.52
cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_workstations:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.60
cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.61
cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_gateways:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.61
cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.62
cpe:2.3:a:f-secure:f-secure_anti-virus:4.62:*:samba_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.64
cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_gateways:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.64
cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.0
cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:linux_client_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.0
cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:linux_server_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.5
cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.5
cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:mimesweeper:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.5
cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:windows_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.11
cpe:2.3:a:f-secure:f-secure_anti-virus:5.11:*:linux_client_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.11
cpe:2.3:a:f-secure:f-secure_anti-virus:5.11:*:linux_server_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.41
cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:mimesweeper:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.41
cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:workstations:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.42
cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:mimesweeper:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.42
cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:windows_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.42
cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:workstations:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.43
cpe:2.3:a:f-secure:f-secure_anti-virus:5.43:*:workstations:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.44
cpe:2.3:a:f-secure:f-secure_anti-virus:5.44:*:workstations:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.52
cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:citrix_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.52
cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.52
cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:mimesweeper:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.52
cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:windows_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.55
cpe:2.3:a:f-secure:f-secure_anti-virus:5.55:*:client_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.01
cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:client_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.01
cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.2
cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:firewalls:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.2
cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.21
cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.30
cpe:2.3:a:f-secure:f-secure_anti-virus:6.30:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.30_sr1
cpe:2.3:a:f-secure:f-secure_anti-virus:6.30_sr1:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.31
cpe:2.3:a:f-secure:f-secure_anti-virus:6.31:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.40
cpe:2.3:a:f-secure:f-secure_anti-virus:6.40:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>2003
cpe:2.3:a:f-secure:f-secure_anti-virus:2003:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>2004
cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>2005
cpe:2.3:a:f-secure:f-secure_anti-virus:2005:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_internet_security>>2004
cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_internet_security>>2005
cpe:2.3:a:f-secure:f-secure_internet_security:2005:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_internet_security>>2006
cpe:2.3:a:f-secure:f-secure_internet_security:2006:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_personal_express>>4.5
cpe:2.3:a:f-secure:f-secure_personal_express:4.5:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_personal_express>>4.6
cpe:2.3:a:f-secure:f-secure_personal_express:4.6:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_personal_express>>4.7
cpe:2.3:a:f-secure:f-secure_personal_express:4.7:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_personal_express>>5.0
cpe:2.3:a:f-secure:f-secure_personal_express:5.0:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>internet_gatekeeper>>2.06
cpe:2.3:a:f-secure:internet_gatekeeper:2.06:*:linux:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://secunia.com/advisories/18529cve@mitre.org
Patch
Vendor Advisory
http://securitytracker.com/id?1015507cve@mitre.org
N/A
http://securitytracker.com/id?1015508cve@mitre.org
N/A
http://securitytracker.com/id?1015509cve@mitre.org
N/A
http://securitytracker.com/id?1015510cve@mitre.org
N/A
http://www.ciac.org/ciac/bulletins/q-103.shtmlcve@mitre.org
N/A
http://www.f-secure.com/security/fsc-2006-1.shtmlcve@mitre.org
Patch
http://www.osvdb.org/22633cve@mitre.org
N/A
http://www.securityfocus.com/bid/16309cve@mitre.org
Patch
http://www.vupen.com/english/advisories/2006/0257cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/24199cve@mitre.org
N/A
http://secunia.com/advisories/18529af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://securitytracker.com/id?1015507af854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1015508af854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1015509af854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1015510af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ciac.org/ciac/bulletins/q-103.shtmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.f-secure.com/security/fsc-2006-1.shtmlaf854a3a-2127-422b-91ae-364da2661108
Patch
http://www.osvdb.org/22633af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/16309af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.vupen.com/english/advisories/2006/0257af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/24199af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://secunia.com/advisories/18529
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://securitytracker.com/id?1015507
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015508
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015509
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015510
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ciac.org/ciac/bulletins/q-103.shtml
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.f-secure.com/security/fsc-2006-1.shtml
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.osvdb.org/22633
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/16309
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.vupen.com/english/advisories/2006/0257
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24199
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/18529
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://securitytracker.com/id?1015507
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015508
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015509
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015510
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ciac.org/ciac/bulletins/q-103.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.f-secure.com/security/fsc-2006-1.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.osvdb.org/22633
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/16309
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.vupen.com/english/advisories/2006/0257
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24199
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

6Records found

CVE-2010-1425
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.50% / 65.43%
||
7 Day CHG~0.00%
Published-15 Apr, 2010 | 21:12
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

F-Secure Internet Security 2010 and earlier; Anti-Virus for Microsoft Exchange 9 and earlier, and for MIMEsweeper 5.61 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, and for Linux 4.02 and earlier; Anti-Virus 2010 and earlier; Home Server Security 2009; Protection Service for Consumers 9 and earlier, for Business - Workstation security 9 and earlier, for Business - Server Security 8 and earlier, and for E-mail and Server security 9 and earlier; Mac Protection build 8060 and earlier; Client Security 9 and earlier; and various Anti-Virus products for Windows, Linux, and Citrix; does not properly detect malware in crafted (1) 7Z, (2) GZIP, (3) CAB, or (4) RAR archives, which makes it easier for remote attackers to avoid detection.

Action-Not Available
Vendor-n/aF-Secure Corporation
Product-f-secure_anti-virus_for_linuxf-secure_anti-virus_for_windows_serversf-secure_internet_securityinternet_gatekeeperhome_server_securityf-secure_anti-virus_for_microsoft_exchangef-secure_anti-virus_client_securityf-secure_anti-virus_linux_server_securityf-secure_anti-virus_for_mimesweeperf-secure_anti-virus_for_citrix_serversanti-virusf-secure_anti-virusf-secure_anti-virus_linux_client_securityf-secure_anti-virus_for_workstationsn/a
CVE-2006-3489
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.34% / 79.72%
||
7 Day CHG~0.00%
Published-10 Jul, 2006 | 22:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

F-Secure Anti-Virus 2003 through 2006 and other versions, Internet Security 2003 through 2006, and Service Platform for Service Providers 6.x and earlier allows remote attackers to bypass anti-virus scanning via a crafted filename.

Action-Not Available
Vendor-n/aF-Secure Corporation
Product-f-secure_service_platform_for_service_providersf-secure_anti-virusf-secure_internet_securityn/a
CVE-2006-3490
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.34% / 79.72%
||
7 Day CHG~0.00%
Published-10 Jul, 2006 | 22:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

F-Secure Anti-Virus 2003 through 2006 and other versions, Internet Security 2003 through 2006, and Service Platform for Service Providers 6.x and earlier does not scan files contained on removable media when "Scan network drives" is disabled, which allows remote attackers to bypass anti-virus controls.

Action-Not Available
Vendor-n/aF-Secure Corporation
Product-f-secure_service_platform_for_service_providersf-secure_anti-virusf-secure_internet_securityn/a
CVE-2004-2442
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-18.90% / 95.15%
||
7 Day CHG~0.00%
Published-20 Aug, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple interpretation error in various F-Secure Anti-Virus products, including Workstation 5.43 and earlier, Windows Servers 5.50 and earlier, MIMEsweeper 5.50 and earlier, Anti-Virus for Linux Servers and Gateways 4.61 and earlier, and other products, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on the target system.

Action-Not Available
Vendor-n/aF-Secure Corporation
Product-f-secure_personal_expressf-secure_internet_securityinternet_gatekeeperf-secure_anti-virusf-secure_for_firewallsn/a
CVE-2004-2220
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.69% / 71.40%
||
7 Day CHG~0.00%
Published-17 Jul, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

F-Secure Anti-Virus for Microsoft Exchange 6.30 and 6.31 does not properly detect certain password-protected files in a ZIP file, which allows remote attackers to bypass anti-virus protection.

Action-Not Available
Vendor-n/aF-Secure Corporation
Product-f-secure_anti-virusn/a
CVE-2021-44751
Matching Score-8
Assigner-126858f1-1b65-4b74-81ca-7034f7f7723f
ShareView Details
Matching Score-8
Assigner-126858f1-1b65-4b74-81ca-7034f7f7723f
CVSS Score-4.3||MEDIUM
EPSS-0.25% / 48.32%
||
7 Day CHG~0.00%
Published-25 Mar, 2022 | 10:32
Updated-04 Aug, 2024 | 04:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
F-Secure SAFE Browser vulnerable to USSD attacks

A vulnerability affecting F-Secure SAFE browser was discovered. A maliciously crafted website attached with USSD code in JavaScript or iFrame can trigger dialer application from F-Secure browser which can be exploited by an attacker to send unwanted USSD messages or perform unwanted calls. In most modern Android OS, dialer application will require user interaction, however, some older Android OS may not need user interaction.

Action-Not Available
Vendor-F-Secure Corporation
Product-safeF-Secure SAFE Browser for Android Version 18.5 & below
CWE ID-CWE-276
Incorrect Default Permissions
Details not found