Eset Anti-Virus before 1.020 (16th September 2004) allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
References
Link | Resource |
---|---|
http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true | |
http://www.kb.cert.org/vuls/id/968818 | US Government Resource |
http://www.securityfocus.com/bid/11448 | Exploit Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
09 Apr 2021, 17:00
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ca:inoculateit:6.0:*:*:*:*:*:*:* |
cpe:2.3:a:broadcom:inoculateit:6.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:* |
09 Apr 2021, 16:00
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ca:etrust_intrusion_detection:1.4.5:*:*:*:*:*:*:* cpe:2.3:a:ca:etrust_intrusion_detection:1.4.1.13:*:*:*:*:*:*:* cpe:2.3:a:ca:etrust_secure_content_manager:1.0:*:*:*:*:*:*:* |
cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:etrust_intrusion_detection:1.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.1.13:*:*:*:*:*:*:* cpe:2.3:a:broadcom:etrust_secure_content_manager:1.0:*:*:*:*:*:*:* |
09 Apr 2021, 13:56
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ca:etrust_ez_antivirus:6.2:*:*:*:*:*:*:* cpe:2.3:a:ca:etrust_ez_antivirus:6.3:*:*:*:*:*:*:* cpe:2.3:a:ca:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:* cpe:2.3:a:ca:etrust_antivirus:7.1:*:*:*:*:*:*:* cpe:2.3:a:ca:etrust_ez_armor:2.3:*:*:*:*:*:*:* cpe:2.3:a:ca:etrust_ez_armor:2.0:*:*:*:*:*:*:* cpe:2.3:a:ca:etrust_ez_antivirus:6.1:*:*:*:*:*:*:* cpe:2.3:a:ca:etrust_antivirus_gateway:7.0:*:*:*:*:*:*:* cpe:2.3:a:ca:etrust_antivirus:7.0:*:*:*:*:*:*:* |
cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:etrust_ez_antivirus:6.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:etrust_ez_antivirus:6.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:etrust_ez_armor:2.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:etrust_ez_armor:2.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:etrust_antivirus:7.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:* |
07 Apr 2021, 18:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:* |
Information
Published : 2005-01-27 05:00
Updated : 2023-12-10 10:28
NVD link : CVE-2004-0935
Mitre link : CVE-2004-0935
CVE.ORG link : CVE-2004-0935
JSON object : View
Products Affected
sophos
- sophos_small_business_suite
- sophos_anti-virus
- sophos_puremessage_anti-virus
ca
- etrust_antivirus
- etrust_secure_content_manager
archive_zip
- archive_zip
kaspersky_lab
- kaspersky_anti-virus
broadcom
- etrust_antivirus
- etrust_intrusion_detection
- inoculateit
- etrust_ez_armor
- brightstor_arcserve_backup
- etrust_ez_antivirus
- etrust_secure_content_manager
- etrust_antivirus_gateway
eset_software
- nod32_antivirus
rav_antivirus
- rav_antivirus_for_file_servers
- rav_antivirus_for_mail_servers
- rav_antivirus_desktop
suse
- suse_linux
gentoo
- linux
mcafee
- antivirus_engine
mandrakesoft
- mandrake_linux
CWE