Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2007-5143 | First vendor Publication | 2007-10-01 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:M/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 1.9 | Attack Range | Local |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 3.4 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
F-Secure Anti-Virus for Windows Servers 7.0 64-bit edition allows local users to bypass virus scanning by using the system32 directory to store a crafted (1) archive or (2) packed executable. NOTE: in many environments, this does not cross privilege boundaries because any process able to write to system32 could also shut off F-Secure Anti-Virus. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5143 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
41377 | F-Secure Anti-Virus for Windows system32 Directory Crafted File Detection Bypass |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-09-28 | Name : The remote Windows host has an antivirus application that may fail to scan se... File : fsecure_fsc2007_6.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:16:10 |
|
2024-11-28 12:13:36 |
|
2020-05-23 00:20:31 |
|
2017-07-29 12:02:34 |
|
2016-06-28 16:57:01 |
|
2016-04-26 16:38:54 |
|
2014-02-17 10:41:55 |
|
2013-05-11 10:37:46 |
|