var-200501-0309
Vulnerability from variot
Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 through 2.4, and EZ-Antivirus 6.1 through 6.3 allow remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. A remote attacker can craft a malicious zip archive and send it a vulnerable user. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. This issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. Latest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200501-0309", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "anti-virus", "scope": "eq", "trust": 1.6, "vendor": "sophos", "version": "3.78d" }, { "model": "small business suite", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "1.0" }, { "model": "puremessage anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "4.6" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.86" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.85" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.84" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.83" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.82" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.81" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.80" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.79" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.78" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.4.6" }, { "model": "antivirus engine", "scope": "eq", "trust": 1.3, "vendor": "mcafee", "version": "4.3.20" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "gentoo", "version": "1.4" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "10.1" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.1" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.12" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.0" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.0" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.13" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "1.0" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.5" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "7.0_sp2" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.11" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.1.13" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "for mail servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.4.2" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.5" }, { "model": "inoculateit", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "4.0" }, { "model": "brightstor arcserve backup", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "11.1" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "5.0" }, { "model": "for file servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "1.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "gentoo", "version": "*" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4" }, { "model": "desktop", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.6" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "9.2" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.3" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "3.0" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.2" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.1" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.3" }, { "model": "archive zip", "scope": "eq", "trust": 1.0, "vendor": "archive zip", "version": "1.13" }, { "model": "anti-virus d", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "3.78" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "antivirus rav antivirus for mail servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.4.2" }, { "model": "antivirus rav antivirus for file servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "1.0" }, { "model": "antivirus rav antivirus desktop", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.6" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "5.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "4.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "3.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.013" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.012" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.011" }, { "model": "associates inoculateit", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.1" }, { "model": "associates etrust secure content manager sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.1.13" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.3" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.0" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.3" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.2" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates brightstor arcserve backup for windows", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "11.1" }, { "model": "archive::zip", "scope": "eq", "trust": 0.3, "vendor": "archive zip", "version": "1.13" }, { "model": "archive::zip", "scope": "ne", "trust": 0.3, "vendor": "archive zip", "version": "1.14" } ], "sources": [ { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0933" }, { "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:archive_zip:archive_zip:1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_secure_content_manager:1.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:antivirus_engine:4.3.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.79:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.80:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_puremessage_anti-virus:4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_small_business_suite:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.85:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.86:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_antivirus:7.0_sp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:inoculateit:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_desktop:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_file_servers:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.81:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.82:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_mail_servers:8.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.83:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.84:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0933" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "iDEFENSE Security Advisory\u203b labs@idefense.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-311" } ], "trust": 0.6 }, "cve": "CVE-2004-0933", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-9363", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-0933", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200501-311", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-9363", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-9363" }, { "db": "NVD", "id": "CVE-2004-0933" }, { "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 through 2.4, and EZ-Antivirus 6.1 through 6.3 allow remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. \nA remote attacker can craft a malicious zip archive and send it a vulnerable user. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. \nThis issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. \nLatest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue", "sources": [ { "db": "NVD", "id": "CVE-2004-0933" }, { "db": "BID", "id": "11448" }, { "db": "VULHUB", "id": "VHN-9363" } ], "trust": 1.26 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-9363", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9363" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2004-0933", "trust": 2.0 }, { "db": "BID", "id": "11448", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-200501-311", "trust": 0.7 }, { "db": "EXPLOIT-DB", "id": "629", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-9363", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-9363" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0933" }, { "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "id": "VAR-200501-0309", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9363" } ], "trust": 0.725 }, "last_update_date": "2023-12-18T12:40:29.156000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Multiple antivirus software Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146860" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0933" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/11448" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17761" }, { "trust": 1.6, "url": "http://www.idefense.com/application/poi/display?id=153\u0026type=vulnerabilities\u0026flashstatus=true" }, { "trust": 0.3, "url": "http://download.mcafee.com/uk/updates/updates.asp" }, { "trust": 0.3, "url": "http://www.nod32.com/" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.ravantivirus.com/" }, { "trust": 0.3, "url": "http://www.sophos.com/" }, { "trust": 0.3, "url": "/archive/1/378660" }, { "trust": 0.1, "url": "http://www.idefense.com/application/poi/display?id=153\u0026amp;type=vulnerabilities\u0026amp;flashstatus=true" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9363" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0933" }, { "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-9363" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0933" }, { "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-01-27T00:00:00", "db": "VULHUB", "id": "VHN-9363" }, { "date": "2004-10-18T00:00:00", "db": "BID", "id": "11448" }, { "date": "2005-01-27T05:00:00", "db": "NVD", "id": "CVE-2004-0933" }, { "date": "2004-10-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-9363" }, { "date": "2009-07-12T08:06:00", "db": "BID", "id": "11448" }, { "date": "2021-04-09T17:00:09.303000", "db": "NVD", "id": "CVE-2004-0933" }, { "date": "2021-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-311" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": " Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-311" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-311" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.