Description
Trend Micro VSAPI 8.700.0.1004 in Trend Micro AntiVirus, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
CVSS Metrics
- Vector
- AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector
- network
- Access Cmplx
- medium
- Auth
- none
- Confidentiality
- complete
- Integrity
- complete
- Availability
- complete
- Weaknesses
- CWE-20
Metadata
- Primary Vendor
- TREND_MICRO
- Published
- 12/12/2008
- Last Modified
- 4/9/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
trend_micro : trend_micro_antivirus
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.