Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2009-1348

EPSS 0.40% · P61
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2009-1348

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The AV engine before DAT 5600 in McAfee VirusScan, Total Protection, Internet Security, SecurityShield for Microsoft ISA Server, Security for Microsoft Sharepoint, Security for Email Servers, Email Gateway, and Active Virus Defense allows remote attackers to bypass virus detection via (1) an invalid Headflags field in a malformed RAR archive, (2) an invalid Packsize field in a malformed RAR archive, or (3) an invalid Filelength field in a malformed ZIP archive.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
McAfee Products 'RAR/ZIP'文件扫描绕过漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
McAfee VirusScan, Total Protection, Internet Security, Microsoft ISA Server SecurityShield,Microsoft Sharepoint Security,Security for Email Servers, Email Gateway和Active Virus Defense中的AV引擎DAT5600之前版本允许远程攻击者借助(1)畸形的RAR存档文件中的一个无效的Headflags字段,(2)畸形的RAR存档文件中
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2009-1348

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2009-1348

登录查看更多情报信息。

Same Patch Batch · n/a · 2009-04-30 · 16 CVEs total

CVE-2009-1313Mozilla Firefox 资源管理错误漏洞
CVE-2009-0663Cmu Perl DBD::Pg 'pg_getline()' 和'getline()'堆缓冲区溢出漏洞
CVE-2009-1255Memcached和MemcacheDB stats maps命令信息泄露漏洞
CVE-2009-1291TIBCO SmartSockets的RTserver组件栈溢出漏洞
CVE-2009-1295Apport 本地任意文件删除漏洞
CVE-2009-1339twiki 会话劫持和跨站请求伪造漏洞
CVE-2009-1341Debian Perl DBD::Pg 'quote.c'内存泄露漏洞
CVE-2009-1415GnuTLS 函数库libgnutls "lib/pk-libgcrypt.c" 远程安全漏洞
CVE-2009-1416GnuTLS 函数库libgnutls "lib/gnutls_pk.c" 远程安全漏洞
CVE-2009-1417GnuTLS "gnutls-cli" 远程安全漏洞
CVE-2009-1432Symantec Reporting Server 输入验证错误漏洞
CVE-2009-1434Foswiki 会话劫持和跨站请求伪造漏洞
CVE-2009-1492Adobe Reader "JavaScript API" 远程代码执行漏洞
CVE-2009-1493Adobe Reader "JavaScript API" 方法customDictionaryOpen远程代码执行漏洞
CVE-2009-1494memcached 'process_stat'函数信息泄露漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2009-1348

No comments yet


Leave a comment