Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2005-3377
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-30 Oct, 2005 | 14:34
Updated At-03 Apr, 2025 | 01:03

Multiple interpretation error in (1) McAfee Internet Security Suite 7.1.5 version 9.1.08 with the 4.4.00 engine and (2) McAfee Corporate 8.0.0 patch 10 with the 4400 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.1MEDIUM
AV:N/AC:H/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 5.1
Base severity: MEDIUM
Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:P
CPE Matches

McAfee, LLC
mcafee
>>internet_security_suite>>7.1.5_version_9.1.08_engine_4.4.00
cpe:2.3:a:mcafee:internet_security_suite:7.1.5_version_9.1.08_engine_4.4.00:*:*:*:*:*:*:*
McAfee, LLC
mcafee
>>internet_security_suite>>8.0.0_patch_10_engine_4400
cpe:2.3:a:mcafee:internet_security_suite:8.0.0_patch_10_engine_4400:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://marc.info/?l=bugtraq&m=113026417802703&w=2cve@mitre.org
N/A
http://www.securityelf.org/magicbyte.htmlcve@mitre.org
N/A
http://www.securityelf.org/magicbyteadv.htmlcve@mitre.org
Vendor Advisory
http://www.securityelf.org/updmagic.htmlcve@mitre.org
N/A
http://www.securityfocus.com/bid/15189cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=113026417802703&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityelf.org/magicbyte.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityelf.org/magicbyteadv.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityelf.org/updmagic.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/15189af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://marc.info/?l=bugtraq&m=113026417802703&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityelf.org/magicbyte.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityelf.org/magicbyteadv.html
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.securityelf.org/updmagic.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/15189
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=113026417802703&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityelf.org/magicbyte.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityelf.org/magicbyteadv.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.securityelf.org/updmagic.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/15189
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Change History
0Changes found

Details not found