Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2009-1348


The AV engine before DAT 5600 in McAfee VirusScan, Total Protection, Internet Security, SecurityShield for Microsoft ISA Server, Security for Microsoft Sharepoint, Security for Email Servers, Email Gateway, and Active Virus Defense allows remote attackers to bypass virus detection via (1) an invalid Headflags field in a malformed RAR archive, (2) an invalid Packsize field in a malformed RAR archive, or (3) an invalid Filelength field in a malformed ZIP archive.


Security Impact Summary

CVE-2009-1348 is a security vulnerability that . Impacting 13 products from mcafee, from mcafee, from mcafee and 10 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Originally identified in 2009, this vulnerability predates many modern security frameworks and practices. The vulnerability landscape of that era was characterized by different threat models and less mature defense mechanisms compared to contemporary standards.


Published

2009-04-30T20:30:00.467

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.6 (HIGH)

CVSSv2 Vector

AV:N/AC:H/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: HIGH
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

4.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application mcafee active_virus_defense * Yes
Application mcafee active_virusscan * Yes
Application mcafee email_gateway * Yes
Application mcafee internet_security_suite * Yes
Application mcafee internet_security_suite 2004 Yes
Application mcafee internet_security_suite 2005 Yes
Application mcafee internet_security_suite 2006 Yes
Application mcafee internet_security_suite 2009 Yes
Application mcafee securityshield_for_email_servers * Yes
Application mcafee securityshield_for_microsoft_isa_server * Yes
Application mcafee securityshield_for_microsoft_sharepoint * Yes
Application mcafee total_protection 2009 Yes
Application mcafee total_protection_for_endpoint * Yes
Application mcafee virusscan_commandline * Yes
Application mcafee virusscan_enterprise * Yes
Application mcafee virusscan_enterprise - Yes
Application mcafee virusscan_enterprise - Yes
Application mcafee virusscan_enterprise - Yes
Application mcafee virusscan_plus 2009 Yes
Application mcafee virusscan_usb * Yes

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For mcafee's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.