F-Prot 4.6.8 for GNU/Linux allows remote attackers to bypass anti-virus protection via a crafted ELF program with a "corrupted" header that still allows the program to be executed. NOTE: due to an error in the initial disclosure, F-secure was incorrectly stated as the vendor.
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/499083 | mailing list |
http://www.securityfocus.com/archive/1/499501/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/32753 | vdb entry |
http://security.gentoo.org/glsa/glsa-200904-14.xml | vendor advisory |
http://secunia.com/advisories/34700 | third party advisory |
http://www.ivizsecurity.com/security-advisory-iviz-sr-08016.html | |
http://securityreason.com/securityalert/4822 | third party advisory |
http://www.securityfocus.com/archive/1/499305/100/0/threaded | mailing list |