Avira Anti-Virus PDF File Scan Evasion

Medium Nessus Network Monitor Plugin ID 5027

Synopsis

The remote host is missing a critical security patch or upgrade.

Description

The remote client is running the Avira Anti-Virus engine.

This version of the Avira scan engine is vulnerable to a flaw wherein attackers can bypass the scan engine by submitting specially formatted 'PDF' files. An attacker, exploiting this flaw, would be able to pass malicious code through the scan engine.

Solution

Upgrade to Avira scan engine 8.2.0.168/7.9.0.168 or later.

See Also

http://blog.zoller.lu/2009/04/advisory-avira-antivir-generic-evasion.html

Plugin Details

Severity: Medium

ID: 5027

File Name: 5027.prm

Family: Web Clients

Published: 2004/08/18

Modified: 2016/01/15

Dependencies: 5014

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSSv3

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS3#E:X/RL:O/RC:C

Reference Information

BID: 35008