F-Prot 4.6.8 for GNU/Linux allows remote attackers to bypass anti-virus protection via a crafted ELF program with a "corrupted" header that still allows the program to be executed. NOTE: due to an error in the initial disclosure, F-secure was incorrectly stated as the vendor.
References
Configurations
History
21 Nov 2024, 00:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/34700 - | |
References | () http://security.gentoo.org/glsa/glsa-200904-14.xml - | |
References | () http://securityreason.com/securityalert/4822 - | |
References | () http://www.ivizsecurity.com/security-advisory-iviz-sr-08016.html - | |
References | () http://www.securityfocus.com/archive/1/499083 - | |
References | () http://www.securityfocus.com/archive/1/499305/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/499501/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/32753 - |
Information
Published : 2008-12-29 15:24
Updated : 2024-11-21 00:54
NVD link : CVE-2008-5747
Mitre link : CVE-2008-5747
CVE.ORG link : CVE-2008-5747
JSON object : View
Products Affected
f-prot
- f-prot_antivirus
CWE
CWE-399
Resource Management Errors