Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2007-3300

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-20 Jun, 2007 | 22:00
Updated At-07 Aug, 2024 | 14:14
Rejected At-
Credits

Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070619 allow remote attackers to bypass scanning via a crafted header in a (1) LHA or (2) RAR archive.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:20 Jun, 2007 | 22:00
Updated At:07 Aug, 2024 | 14:14
Rejected At:
▼CVE Numbering Authority (CNA)

Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070619 allow remote attackers to bypass scanning via a crafted header in a (1) LHA or (2) RAR archive.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/25738
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/24525
vdb-entry
x_refsource_BID
http://www.securitytracker.com/id?1018267
vdb-entry
x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/34942
vdb-entry
x_refsource_XF
http://www.f-secure.com/security/fsc-2007-5.shtml
x_refsource_CONFIRM
http://osvdb.org/36729
vdb-entry
x_refsource_OSVDB
http://www.securitytracker.com/id?1018266
vdb-entry
x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2007/2247
vdb-entry
x_refsource_VUPEN
http://www.securitytracker.com/id?1018268
vdb-entry
x_refsource_SECTRACK
http://osvdb.org/36728
vdb-entry
x_refsource_OSVDB
Hyperlink: http://secunia.com/advisories/25738
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/24525
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.securitytracker.com/id?1018267
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34942
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.f-secure.com/security/fsc-2007-5.shtml
Resource:
x_refsource_CONFIRM
Hyperlink: http://osvdb.org/36729
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.securitytracker.com/id?1018266
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vupen.com/english/advisories/2007/2247
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securitytracker.com/id?1018268
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://osvdb.org/36728
Resource:
vdb-entry
x_refsource_OSVDB
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/25738
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/24525
vdb-entry
x_refsource_BID
x_transferred
http://www.securitytracker.com/id?1018267
vdb-entry
x_refsource_SECTRACK
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/34942
vdb-entry
x_refsource_XF
x_transferred
http://www.f-secure.com/security/fsc-2007-5.shtml
x_refsource_CONFIRM
x_transferred
http://osvdb.org/36729
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.securitytracker.com/id?1018266
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vupen.com/english/advisories/2007/2247
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securitytracker.com/id?1018268
vdb-entry
x_refsource_SECTRACK
x_transferred
http://osvdb.org/36728
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://secunia.com/advisories/25738
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/24525
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.securitytracker.com/id?1018267
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34942
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.f-secure.com/security/fsc-2007-5.shtml
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://osvdb.org/36729
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.securitytracker.com/id?1018266
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2247
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securitytracker.com/id?1018268
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://osvdb.org/36728
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:20 Jun, 2007 | 22:30
Updated At:29 Jul, 2017 | 01:32

Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070619 allow remote attackers to bypass scanning via a crafted header in a (1) LHA or (2) RAR archive.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 9.3
Base severity: HIGH
Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

F-Secure Corporation
f-secure
>>f-secure_anti-virus>>2.16
cpe:2.3:a:f-secure:f-secure_anti-virus:2.16:*:linux_gateways:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.51
cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.51
cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.52
cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.52
cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.61
cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_gateways:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.61
cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.64
cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_gateways:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.64
cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.65
cpe:2.3:a:f-secure:f-secure_anti-virus:4.65:*:linux_gateways:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>4.65
cpe:2.3:a:f-secure:f-secure_anti-virus:4.65:*:linux_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.0.2
cpe:2.3:a:f-secure:f-secure_anti-virus:5.0.2:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.2.1
cpe:2.3:a:f-secure:f-secure_anti-virus:5.2.1:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.3.0
cpe:2.3:a:f-secure:f-secure_anti-virus:5.3.0:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.5
cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.40
cpe:2.3:a:f-secure:f-secure_anti-virus:5.40:*:workstations:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.41
cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:windows_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.41
cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:workstations:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.42
cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:windows_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.42
cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:workstations:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.43
cpe:2.3:a:f-secure:f-secure_anti-virus:5.43:*:workstations:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.44
cpe:2.3:a:f-secure:f-secure_anti-virus:5.44:*:workstations:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.52
cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:citrix_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.52
cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.54
cpe:2.3:a:f-secure:f-secure_anti-virus:5.54:*:client_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.55
cpe:2.3:a:f-secure:f-secure_anti-virus:5.55:*:client_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.56
cpe:2.3:a:f-secure:f-secure_anti-virus:5.56:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>5.61
cpe:2.3:a:f-secure:f-secure_anti-virus:5.61:*:mimesweeper:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.01
cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:client_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.01
cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.02
cpe:2.3:a:f-secure:f-secure_anti-virus:6.02:*:client_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.2
cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.03
cpe:2.3:a:f-secure:f-secure_anti-virus:6.03:*:client_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.21
cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.30
cpe:2.3:a:f-secure:f-secure_anti-virus:6.30:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.30_sr1
cpe:2.3:a:f-secure:f-secure_anti-virus:6.30_sr1:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.31
cpe:2.3:a:f-secure:f-secure_anti-virus:6.31:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.40
cpe:2.3:a:f-secure:f-secure_anti-virus:6.40:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.60
cpe:2.3:a:f-secure:f-secure_anti-virus:6.60:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>6.61
cpe:2.3:a:f-secure:f-secure_anti-virus:6.61:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>7.00
cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:client_security:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>7.00
cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:ms_exchange:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>7.00
cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:windows_servers:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>7.00
cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:workstations:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>2005
cpe:2.3:a:f-secure:f-secure_anti-virus:2005:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>2006
cpe:2.3:a:f-secure:f-secure_anti-virus:2006:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus>>2007
cpe:2.3:a:f-secure:f-secure_anti-virus:2007:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus_linux_client_security>>Versions up to 5.52(inclusive)
cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:*:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_anti-virus_linux_server_security>>Versions up to 5.52(inclusive)
cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:*:*:*:*:*:*:*:*
F-Secure Corporation
f-secure
>>f-secure_internet_security>>2005
cpe:2.3:a:f-secure:f-secure_internet_security:2005:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://osvdb.org/36728cve@mitre.org
N/A
http://osvdb.org/36729cve@mitre.org
N/A
http://secunia.com/advisories/25738cve@mitre.org
Vendor Advisory
http://www.f-secure.com/security/fsc-2007-5.shtmlcve@mitre.org
N/A
http://www.securityfocus.com/bid/24525cve@mitre.org
N/A
http://www.securitytracker.com/id?1018266cve@mitre.org
N/A
http://www.securitytracker.com/id?1018267cve@mitre.org
N/A
http://www.securitytracker.com/id?1018268cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2007/2247cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/34942cve@mitre.org
N/A
Hyperlink: http://osvdb.org/36728
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://osvdb.org/36729
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/25738
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.f-secure.com/security/fsc-2007-5.shtml
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/24525
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1018266
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1018267
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1018268
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2247
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34942
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

3Records found

CVE-2017-6466
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.75% / 72.13%
||
7 Day CHG~0.00%
Published-11 Mar, 2017 | 06:46
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

F-Secure Software Updater 2.20, as distributed in several F-Secure products, downloads installation packages over plain http and does not perform file integrity validation after download. Man-in-the-middle attackers can replace the file with their own executable which will be executed under the SYSTEM account. Note that when Software Updater is configured to install updates automatically, it checks if the downloaded file is digitally signed by default, but does not check the author of the signature. When running in manual mode (default), no signature check is performed.

Action-Not Available
Vendor-n/aF-Secure Corporation
Product-software_updatern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2020-14978
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.80% / 73.12%
||
7 Day CHG~0.00%
Published-23 Jun, 2020 | 19:01
Updated-04 Aug, 2024 | 13:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in F-Secure SAFE 17.7 on macOS. Due to incorrect client version verification, an attacker can connect to a privileged XPC service, and execute privileged commands on the system. NOTE: the attacker needs to execute code on an already compromised machine.

Action-Not Available
Vendor-n/aF-Secure Corporation
Product-safen/a
CVE-2020-14977
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.80% / 73.12%
||
7 Day CHG~0.00%
Published-23 Jun, 2020 | 19:02
Updated-04 Aug, 2024 | 13:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in F-Secure SAFE 17.7 on macOS. The XPC services use the PID to identify the connecting client, which allows an attacker to perform a PID reuse attack and connect to a privileged XPC service, and execute privileged commands on the system. NOTE: the attacker needs to execute code on an already compromised machine.

Action-Not Available
Vendor-n/aF-Secure Corporation
Product-safen/a
Details not found