var-200501-0310
Vulnerability from variot

Kaspersky 3.x to 4.x allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Anti-virus software may rely on corrupted headers to determine if a zip archive is valid. As a result, anti-virus software may fail to detect malicious content within a zip archive. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. This issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. Latest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. Kaspersky is a well-known antivirus software. Kaspersky 3.x and 4.x versions have issues when processing .zip files, resulting in a vulnerability to bypass antivirus checks.

II. DESCRIPTION

Remote exploitation of an exceptional condition error in multiple vendors' anti-virus software allows attackers to bypass security protections by evading virus detection. The .zip file format stores information about compressed files in two locations - a local header and a global header. The local header exists just before the compressed data of each file, and the global header exists at the end of the .zip archive. It is possible to modify the uncompressed size of archived files in both the local and global header without affecting functionality. This has been confirmed with both WinZip and Microsoft Compressed Folders. An attacker can compress a malicious payload and evade detection by some anti-virus software by modifying the uncompressed size within the local and global headers to zero.

III. ANALYSIS

Successful exploitation allows remote attackers to pass malicious payloads within a compressed archive to a target without being detected. Most anti-virus engines have the ability to scan content packaged with compressed archives. As such, users with up-to-date anti-virus software are more likely to open attachments and files if they are under the false impression that the archive was already scanned and found to not contain a virus.

IV. The Vendor Responses section of this advisory contains details on the status of specific vendor fixes for this issue.

V. WORKAROUND

Filter all compressed file archives (.zip) at border gateways, regardless of content.

VI. VENDOR RESPONSES

McAfee "The McAfee scan engine has always been a market leader in detection of viruses, worms and Trojans within compressed and archived file formats. As such the mechanism used for the detection of such payloads has been designed to ensure all archive files are thoroughly scanned at each nested level in the file to ensure that all appropriate parts of the file are scanned.

McAfee is aware of a proof of concept exploitation in Zip archive payloads where information in the local header part of the archive is modified.

The local header exists just before the compressed data of each file. It is possible to modify the uncompressed size of archived files in the local header without affecting functionality. Consequently there is the potential for a malicious payload to be hidden and avoid anti-virus detection by modifying the uncompressed size within the local headers to zero.

The techniques used by McAfee to analyze Zip archives have allowed a comprehensive solution for the Zip file format vulnerability to be provided to protect customers.

The latest update for the current 4320 McAfee Anti-Virus Engine DATS drivers (Version 4398 released on Oct 13th 2004) further enhances the protection afforded to McAfee customers against such potential exploits.

A DATS Driver update issued in Version 4397 (October 6th 2004) provided early protection for the same potential exploit targeted specifically for Gateway and Command line scanning.

If a detection of this type of exploit is found it will trigger the message "Found the Exploit-Zip Trojan!" to be displayed.

Updates for the DAT files mentioned above can be located at the following links:

Home (Retail) Users: http://download.mcafee.com/uk/updates/updates.asp

Business (Enterprise) Users: http://www.mcafeesecurity.com/uk/downloads/updates/dat.asp?id=1

It should be noted that whilst McAfee take the potential for this exploit to be used maliciously seriously, to date no evidence of such an exploit has been discovered. McAfee has provided additional protection through the DATS driver update however with usage of the comprehensive suite of anti-virus protection strategies provided by McAfee products, MacAfee are confident that this exploit presented no additional threat to its customers.

It should be noted that with McAfee on-access scanning active, such modification for malicious purposes to hide payloads only delays eventual detection - McAfee on-access detection will detect any payload with malicious intent as malware.

McAfee continues to focus on ensuring that customers receive maximum protection and provide a rapid response to all potential vulnerabilities thus ensuring customer satisfaction."

Computer Associates "With the assistance of iDEFENSE, Computer Associates has identified a medium-risk vulnerability in a shared component of eTrust Antivirus which may allow a specially crafted .ZIP file to bypass virus detection. A number of CA products embed this technology including solutions from eTrust, Brightstor and others.

Customers are encouraged to visit the CA support web site below for more information about this vulnerability, a list of products and platforms that are effected, and remediation procedures. http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp.

At Computer Associates, every reported exposure is handled with the utmost urgency. We strive to ensure that no customer is left in a vulnerable situation."

Kaspersky (09/24/2004) "...this bug for scanners based on 3.x-4.x engines will be fixed in next (not current) cumulative update.

For scanners based on new 5.0 engine we recommend you waiting for the release of our next maintenance pack. We are going to release it in October."

Sophos "A vulnerability has been discovered in Sophos's handling of Zip archive files, whereby a Zip file can be deliberately altered to prevent accurate scanning by Sophos anti-virus products of its contents.

Although theoretically a risk, Sophos has not seen any examples of malware attempting to employ this vulnerability.

Furthermore, The vulnerability does not prevent Sophos's desktop on-access scanner from correctly detecting viruses (and preventing actual infection) which manage to bypass the email gateway software, so the risks of infection are very small.

Sophos has enhanced its scan engine to deal with malformed Zip files. Version 3.87.0 of Sophos Anti-Virus on all operating system platforms except Windows 95/98/Me includes this fix and customers will be automatically updated to this version via EM Library from Wednesday 20 October 2004. Additionally, a version of the software will be available for download from the Sophos website from Friday 22 October 2004.

Sophos Anti-Virus for Windows 95/98/Me customers will be updated with the fix from version 3.88.0 (available from 24 November 2004).

Sophos thanks iDEFENSE for their assistance in identifying this vulnerability."

Eset "The vulnerability was caused by the fact that some archive compression/decompression software (including Winzip) incorrectly handles compressed files with deliberately damaged header fields, thus, in-fact, allowing creation of the damaged archive files, that could be automatically repaired on the victims computer without notifying the user.

Eset has made appropriate modifications to archive-scanning code to handle such kind of archives immediately after receiving notification from iDEFENSE. These changes are contained in archive-support module version 1.020, released on 16th September 2004 at 21:00 CET. The update was available for all clients with Automatic Virus-Signatures Update set."

RAV No vendor response

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues:

CAN-2004-0932 - McAfee CAN-2004-0933 - Computer Associates CAN-2004-0934 - Kaspersky CAN-2004-0937 - Sophos CAN-2004-0935 - Eset CAN-2004-0936 - RAV

These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems.

VIII. DISCLOSURE TIMELINE

09/16/2004 Initial vendor notification 09/16/2004 iDEFENSE clients notified 10/18/2004 Coordinated public disclosure

IX. CREDIT

The discoverer of this vulnerability wishes to remain anonymous.

Get paid for vulnerability research http://www.idefense.com/poi/teams/vcp.jsp

X. LEGAL NOTICES

Copyright © 2004 iDEFENSE, Inc.

Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDEFENSE. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please email customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200501-0310",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "suse",
        "version": "9.2"
      },
      {
        "model": "small business suite",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "1.0"
      },
      {
        "model": "puremessage anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "4.6"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.86"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.85"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.84"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.83"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.82"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.81"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.80"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.79"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.78"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sophos",
        "version": "3.4.6"
      },
      {
        "model": "antivirus engine",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "mcafee",
        "version": "4.3.20"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "mandrake linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mandrakesoft",
        "version": "10.1"
      },
      {
        "model": "etrust antivirus gateway",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "7.1"
      },
      {
        "model": "etrust secure content manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "1.1"
      },
      {
        "model": "nod32 antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "eset",
        "version": "1.0.12"
      },
      {
        "model": "etrust ez armor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "2.0"
      },
      {
        "model": "etrust secure content manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "1.0"
      },
      {
        "model": "nod32 antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "eset",
        "version": "1.0.13"
      },
      {
        "model": "etrust secure content manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "ca",
        "version": "1.0"
      },
      {
        "model": "etrust intrusion detection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "1.5"
      },
      {
        "model": "etrust antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "ca",
        "version": "7.0_sp2"
      },
      {
        "model": "nod32 antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "eset",
        "version": "1.0.11"
      },
      {
        "model": "etrust intrusion detection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "1.4.1.13"
      },
      {
        "model": "etrust antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "7.0"
      },
      {
        "model": "for mail servers",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "rav antivirus",
        "version": "8.4.2"
      },
      {
        "model": "etrust intrusion detection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "1.4.5"
      },
      {
        "model": "inoculateit",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "6.0"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kaspersky lab",
        "version": "4.0"
      },
      {
        "model": "brightstor arcserve backup",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "11.1"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kaspersky lab",
        "version": "5.0"
      },
      {
        "model": "for file servers",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "rav antivirus",
        "version": "1.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gentoo",
        "version": "*"
      },
      {
        "model": "etrust ez armor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "2.4"
      },
      {
        "model": "desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "rav antivirus",
        "version": "8.6"
      },
      {
        "model": "etrust ez antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "6.3"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kaspersky lab",
        "version": "3.0"
      },
      {
        "model": "etrust antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "7.1"
      },
      {
        "model": "etrust antivirus gateway",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "7.0"
      },
      {
        "model": "etrust ez antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "6.2"
      },
      {
        "model": "etrust ez antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "6.1"
      },
      {
        "model": "etrust ez armor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": "2.3"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sophos",
        "version": "3.78d"
      },
      {
        "model": "archive zip",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "archive zip",
        "version": "1.13"
      },
      {
        "model": "anti-virus d",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sophos",
        "version": "3.78"
      },
      {
        "model": "linux personal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "s u s e",
        "version": "9.2"
      },
      {
        "model": "antivirus rav antivirus for mail servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rav",
        "version": "8.4.2"
      },
      {
        "model": "antivirus rav antivirus for file servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rav",
        "version": "1.0"
      },
      {
        "model": "antivirus rav antivirus desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rav",
        "version": "8.6"
      },
      {
        "model": "linux mandrake x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "10.1"
      },
      {
        "model": "linux mandrake",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "10.1"
      },
      {
        "model": "labs antivirus scanning engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kaspersky",
        "version": "5.0"
      },
      {
        "model": "labs antivirus scanning engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kaspersky",
        "version": "4.0"
      },
      {
        "model": "labs antivirus scanning engine",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kaspersky",
        "version": "3.0"
      },
      {
        "model": "linux",
        "scope": null,
        "trust": 0.3,
        "vendor": "gentoo",
        "version": null
      },
      {
        "model": "nod32 antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "eset",
        "version": "1.013"
      },
      {
        "model": "nod32 antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "eset",
        "version": "1.012"
      },
      {
        "model": "nod32 antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "eset",
        "version": "1.011"
      },
      {
        "model": "associates inoculateit",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "6.0"
      },
      {
        "model": "associates etrust secure content manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "1.1"
      },
      {
        "model": "associates etrust secure content manager sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "1.0"
      },
      {
        "model": "associates etrust secure content manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "1.0"
      },
      {
        "model": "associates etrust intrusion detection",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "1.5"
      },
      {
        "model": "associates etrust intrusion detection",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "1.4.5"
      },
      {
        "model": "associates etrust intrusion detection",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "1.4.1.13"
      },
      {
        "model": "associates etrust ez armor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "2.4"
      },
      {
        "model": "associates etrust ez armor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "2.3"
      },
      {
        "model": "associates etrust ez armor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "2.0"
      },
      {
        "model": "associates etrust ez antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "6.3"
      },
      {
        "model": "associates etrust ez antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "6.2"
      },
      {
        "model": "associates etrust ez antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "6.1"
      },
      {
        "model": "associates etrust antivirus for the gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "7.1"
      },
      {
        "model": "associates etrust antivirus for the gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "7.0"
      },
      {
        "model": "associates etrust antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "7.1"
      },
      {
        "model": "associates etrust antivirus sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "7.0"
      },
      {
        "model": "associates etrust antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "7.0"
      },
      {
        "model": "associates brightstor arcserve backup for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "computer",
        "version": "11.1"
      },
      {
        "model": "archive::zip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "archive zip",
        "version": "1.13"
      },
      {
        "model": "archive::zip",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "archive zip",
        "version": "1.14"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "11448"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0934"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-310"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:archive_zip:archive_zip:1.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ca:etrust_secure_content_manager:1.0:sp1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78d:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.85:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.86:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ca:etrust_antivirus:7.0_sp2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:inoculateit:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_desktop:8.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_file_servers:1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.81:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.82:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:mcafee:antivirus_engine:4.3.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.79:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.80:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sophos:sophos_puremessage_anti-virus:4.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sophos:sophos_small_business_suite:1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.1.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_mail_servers:8.4.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.4.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.83:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.84:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0934"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "iDEFENSE Security Advisory\u203b labs@idefense.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-310"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2004-0934",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": true,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-9364",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2004-0934",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#968818",
            "trust": 0.8,
            "value": "7.59"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200501-310",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-9364",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#968818"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9364"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0934"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-310"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kaspersky 3.x to 4.x allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Anti-virus software may rely on corrupted headers to determine if a zip archive is valid. As a result, anti-virus software may fail to detect malicious content within a zip archive. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability.  This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected.  The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security.  If the user opens and executes the file, this attack can result in a malicious code infection. \nThis issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. \nLatest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. Kaspersky is a well-known antivirus software. Kaspersky 3.x and 4.x versions have issues when processing .zip files, resulting in a vulnerability to bypass antivirus checks. \n\nII. DESCRIPTION\n\nRemote exploitation of an exceptional condition error in multiple\nvendors\u0027 anti-virus software allows attackers to bypass security\nprotections by evading virus detection. \nThe .zip file format stores information about compressed files in two\nlocations - a local header and a global header. The local header exists\njust before the compressed data of each file, and the global header\nexists at the end of the .zip archive. It is possible to modify the\nuncompressed size of archived files in both the local and global header\nwithout affecting functionality. This has been confirmed with both\nWinZip and Microsoft Compressed Folders. An attacker can compress a\nmalicious payload and evade detection by some anti-virus software by\nmodifying the uncompressed size within the local and global headers to\nzero. \n\nIII. ANALYSIS\n\nSuccessful exploitation allows remote attackers to pass malicious\npayloads within a compressed archive to a target without being detected. \nMost anti-virus engines have the ability to scan content packaged with\ncompressed archives. As such, users with up-to-date anti-virus software\nare more likely to open attachments and files if they are under the\nfalse impression that the archive was already scanned and found to not\ncontain a virus. \n\nIV. The Vendor Responses section of this\nadvisory contains details on the status of specific vendor fixes for\nthis issue. \n\nV. WORKAROUND\n\nFilter all compressed file archives (.zip) at border gateways,\nregardless of content. \n\nVI. VENDOR RESPONSES\n\nMcAfee\n\"The McAfee scan engine has always been a market leader in detection of\nviruses, worms and Trojans within compressed and archived file formats. \nAs such the mechanism used for the detection of such payloads has been\ndesigned to ensure all archive files are thoroughly scanned at each\nnested level in the file to ensure that all appropriate parts of the\nfile are scanned. \n\nMcAfee is aware of a proof of concept exploitation in Zip archive\npayloads where information in the local header part of the archive is\nmodified. \n\nThe local header exists just before the compressed data of each file. It\nis possible to modify the uncompressed size of archived files in the\nlocal header without affecting functionality.  Consequently there is the\npotential for a malicious payload to be hidden and avoid anti-virus\ndetection by modifying the uncompressed size within the local headers to\nzero. \n\nThe techniques used by McAfee to analyze Zip archives have allowed a\ncomprehensive solution for the Zip file format vulnerability to be\nprovided to protect customers. \n\nThe latest update for the current 4320 McAfee Anti-Virus Engine DATS\ndrivers (Version 4398 released on Oct 13th 2004) further enhances the\nprotection afforded to McAfee customers against such potential exploits. \n\nA DATS Driver update issued in Version 4397 (October 6th 2004) provided\nearly protection for the same potential exploit targeted specifically\nfor Gateway and Command line scanning. \n\nIf a detection of this type of exploit is found it will trigger the\nmessage \"Found the Exploit-Zip Trojan!\" to be displayed. \n\nUpdates for the DAT files mentioned above can be located at the\nfollowing links:\n\nHome (Retail) Users:\nhttp://download.mcafee.com/uk/updates/updates.asp\n\nBusiness (Enterprise) Users:\nhttp://www.mcafeesecurity.com/uk/downloads/updates/dat.asp?id=1\n\nIt should be noted that whilst McAfee take the potential for this\nexploit to be used maliciously seriously, to date no evidence of such an\nexploit has been discovered. McAfee has provided additional protection\nthrough the DATS driver update however with usage of the comprehensive\nsuite of anti-virus protection strategies provided by McAfee products,\nMacAfee are confident that this exploit presented no additional threat\nto its customers. \n\nIt should be noted that with McAfee on-access scanning active, such\nmodification for malicious purposes to hide payloads only delays\neventual detection - McAfee on-access detection will detect any payload\nwith malicious intent as malware. \n\nMcAfee continues to focus on ensuring that customers receive maximum\nprotection and provide a rapid response to all potential vulnerabilities\nthus ensuring customer satisfaction.\"\n\nComputer Associates\n\"With the assistance of iDEFENSE, Computer Associates has identified a\nmedium-risk vulnerability in a shared component of eTrust Antivirus\nwhich may allow a specially crafted .ZIP file to bypass virus detection. \nA number of CA products embed this technology including solutions from\neTrust, Brightstor and others. \n\nCustomers are encouraged to visit the CA support web site below for more\ninformation about this vulnerability, a list of products and platforms\nthat are effected, and remediation procedures. \nhttp://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp. \n\nAt Computer Associates, every reported exposure is handled with the\nutmost urgency. We strive to ensure that no customer is left in a\nvulnerable situation.\"\n\nKaspersky\n(09/24/2004)\n\"...this bug for scanners based on 3.x-4.x engines will be fixed in next\n(not current) cumulative update. \n\nFor scanners based on new 5.0 engine we recommend you waiting for the\nrelease of our next maintenance pack. We are going to release it in\nOctober.\"\n\nSophos\n\"A vulnerability has been discovered in Sophos\u0027s handling of Zip archive\nfiles, whereby a Zip file can be deliberately altered to prevent\naccurate scanning by Sophos anti-virus products of its contents. \n\nAlthough theoretically a risk, Sophos has not seen any examples of\nmalware attempting to employ this vulnerability. \n\nFurthermore, The vulnerability does not prevent Sophos\u0027s desktop\non-access scanner from correctly detecting viruses (and preventing\nactual infection) which manage to bypass the email gateway software, so\nthe risks of infection are very small. \n\nSophos has enhanced its scan engine to deal with malformed Zip files. \nVersion 3.87.0 of Sophos Anti-Virus on all operating system platforms\nexcept Windows 95/98/Me includes this fix and customers will be\nautomatically updated to this version via EM Library from Wednesday 20\nOctober 2004.  Additionally, a version of the software will be available\nfor download from the Sophos website from Friday 22 October 2004. \n\nSophos Anti-Virus for Windows 95/98/Me customers will be updated with\nthe fix from version 3.88.0 (available from 24 November 2004). \n\nSophos thanks iDEFENSE for their assistance in identifying this\nvulnerability.\"\n\nEset\n\"The vulnerability was caused by the fact that some archive\ncompression/decompression software (including Winzip) incorrectly\nhandles compressed files with deliberately damaged header fields, thus,\nin-fact, allowing creation of the damaged archive files, that could be\nautomatically repaired on the victims computer without notifying the\nuser. \n\nEset has made appropriate modifications to archive-scanning code to\nhandle such kind of archives immediately after receiving notification\nfrom iDEFENSE. These changes are contained in archive-support module\nversion 1.020, released on 16th September 2004 at 21:00 CET. The update\nwas available for all clients with Automatic Virus-Signatures Update\nset.\"\n\nRAV\nNo vendor response\n\nVII. CVE INFORMATION\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nfollowing names to these issues:\n\nCAN-2004-0932 - McAfee\nCAN-2004-0933 - Computer Associates\nCAN-2004-0934 - Kaspersky\nCAN-2004-0937 - Sophos\nCAN-2004-0935 - Eset\nCAN-2004-0936 - RAV\n\nThese are candidates for inclusion in the CVE list\n(http://cve.mitre.org), which standardizes names for security problems. \n\nVIII. DISCLOSURE TIMELINE\n\n09/16/2004  Initial vendor notification\n09/16/2004  iDEFENSE clients notified\n10/18/2004  Coordinated public disclosure\n\nIX. CREDIT\n\nThe discoverer of this vulnerability wishes to remain anonymous. \n\nGet paid for vulnerability research\nhttp://www.idefense.com/poi/teams/vcp.jsp\n\nX. LEGAL NOTICES\n\nCopyright \u00a9 2004 iDEFENSE, Inc. \n\nPermission is granted for the redistribution of this alert\nelectronically. It may not be edited in any way without the express\nwritten consent of iDEFENSE. If you wish to reprint the whole or any\npart of this alert in any other medium other than electronically, please\nemail customerservice@idefense.com for permission. \n\nDisclaimer: The information in the advisory is believed to be accurate\nat the time of publishing based on currently available information. Use\nof the information constitutes acceptance for use in an AS IS condition. \nThere are no warranties with regard to this information. Neither the\nauthor nor the publisher accepts any liability for any direct, indirect,\nor consequential loss or damage arising from use of, or reliance on,\nthis information",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0934"
      },
      {
        "db": "CERT/CC",
        "id": "VU#968818"
      },
      {
        "db": "BID",
        "id": "11448"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9364"
      },
      {
        "db": "PACKETSTORM",
        "id": "34757"
      }
    ],
    "trust": 2.07
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-9364",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9364"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#968818",
        "trust": 2.5
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0934",
        "trust": 2.1
      },
      {
        "db": "BID",
        "id": "11448",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-310",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "34757",
        "trust": 0.2
      },
      {
        "db": "EXPLOIT-DB",
        "id": "629",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-9364",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#968818"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9364"
      },
      {
        "db": "BID",
        "id": "11448"
      },
      {
        "db": "PACKETSTORM",
        "id": "34757"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0934"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-310"
      }
    ]
  },
  "id": "VAR-200501-0310",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9364"
      }
    ],
    "trust": 0.725
  },
  "last_update_date": "2023-12-18T12:40:28.981000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Kaspersky zip Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146861"
      }
    ],
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-310"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0934"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/11448"
      },
      {
        "trust": 1.7,
        "url": "http://www.kb.cert.org/vuls/id/968818"
      },
      {
        "trust": 1.7,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17761"
      },
      {
        "trust": 1.6,
        "url": "http://www.idefense.com/application/poi/display?id=153\u0026type=vulnerabilities\u0026flashstatus=true"
      },
      {
        "trust": 0.8,
        "url": "http://www.linuxsecurity.com/advisories/gentoo_advisory-5043.html"
      },
      {
        "trust": 0.8,
        "url": "http://rt.cpan.org/noauth/bug.html?id=8077"
      },
      {
        "trust": 0.8,
        "url": "http://www.idefense.com/application/poi/display?id=153"
      },
      {
        "trust": 0.4,
        "url": "http://download.mcafee.com/uk/updates/updates.asp"
      },
      {
        "trust": 0.3,
        "url": "http://www.nod32.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.kaspersky.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.ravantivirus.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.sophos.com/"
      },
      {
        "trust": 0.3,
        "url": "http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/378660"
      },
      {
        "trust": 0.1,
        "url": "http://www.idefense.com/application/poi/display?id=153\u0026amp;type=vulnerabilities\u0026amp;flashstatus=true"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0934"
      },
      {
        "trust": 0.1,
        "url": "http://www.idefense.com/poi/teams/vcp.jsp"
      },
      {
        "trust": 0.1,
        "url": "http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp."
      },
      {
        "trust": 0.1,
        "url": "http://www.mcafeesecurity.com/uk/downloads/updates/dat.asp?id=1"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org),"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#968818"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9364"
      },
      {
        "db": "BID",
        "id": "11448"
      },
      {
        "db": "PACKETSTORM",
        "id": "34757"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0934"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-310"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#968818"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9364"
      },
      {
        "db": "BID",
        "id": "11448"
      },
      {
        "db": "PACKETSTORM",
        "id": "34757"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0934"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-310"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-12-10T00:00:00",
        "db": "CERT/CC",
        "id": "VU#968818"
      },
      {
        "date": "2005-01-27T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9364"
      },
      {
        "date": "2004-10-18T00:00:00",
        "db": "BID",
        "id": "11448"
      },
      {
        "date": "2004-10-26T03:28:25",
        "db": "PACKETSTORM",
        "id": "34757"
      },
      {
        "date": "2005-01-27T05:00:00",
        "db": "NVD",
        "id": "CVE-2004-0934"
      },
      {
        "date": "2004-10-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200501-310"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-01-14T00:00:00",
        "db": "CERT/CC",
        "id": "VU#968818"
      },
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9364"
      },
      {
        "date": "2009-07-12T08:06:00",
        "db": "BID",
        "id": "11448"
      },
      {
        "date": "2021-04-09T17:00:09.303000",
        "db": "NVD",
        "id": "CVE-2004-0934"
      },
      {
        "date": "2021-04-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200501-310"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-310"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Anti-virus software may not properly scan malformed zip archives",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#968818"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200501-310"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.