CVE-2023-29144
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-12

Last updated on: 2025-12-19

Assigner: MITRE

Description
Malwarebytes 1.0.14 for Linux doesn't properly compute signatures in some scenarios. This allows a bypass of detection.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-12
Last Modified
2025-12-19
Generated
2026-05-06
AI Q&A
2025-12-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
malwarebytes malwarebytes 1.0.14
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-190 The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is related to Malwarebytes Endpoint Agent for Linux versions prior to 1.1.64 and Malwarebytes for Windows v5 with update package versions below 1.0.104841 not properly computing signatures, allowing detection bypass. To detect if your system is vulnerable, check the installed version of Malwarebytes Endpoint Agent for Linux or Malwarebytes for Windows. For Linux, you can run a command like `malwarebytes --version` or check the package version via your package manager. For Windows, check the version in the application or via command line tools like `wmic product get name,version` to verify if the version is below the patched one. There are no specific network detection commands provided in the resources. [2]


Can you explain this vulnerability to me?

This vulnerability in Malwarebytes 1.0.14 for Linux involves improper computation of signatures in certain scenarios, which allows an attacker to bypass detection by the software.


How can this vulnerability impact me? :

The impact of this vulnerability is that malware or malicious activity may go undetected by Malwarebytes on Linux systems, potentially allowing harmful software to operate without being flagged or removed.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade affected endpoints to the patched versions. For Malwarebytes Endpoint Agent for Linux, upgrade to version 1.1.64 or later. For Malwarebytes for Windows v5, upgrade to version 5.3.0.186 or higher with update package version 1.0.104841 or above. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart