CVE-2005-3377

N/A Unknown
Published: October 30, 2005 Modified: April 16, 2026
View on NVD

Description

Multiple interpretation error in (1) McAfee Internet Security Suite 7.1.5 version 9.1.08 with the 4.4.00 engine and (2) McAfee Corporate 8.0.0 patch 10 with the 4400 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.securityelf.org/magicbyteadv.html
Source: cve@mitre.org
Vendor Advisory
http://marc.info/?l=bugtraq&m=113026417802703&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityelf.org/magicbyte.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityelf.org/magicbyteadv.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityelf.org/updmagic.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/15189
Source: af854a3a-2127-422b-91ae-364da2661108

10 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.4%
64th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

mcafee