Executive Summary
Summary | |
---|---|
Title | New clamav packages fix arbitrary code execution |
Informations | |||
---|---|---|---|
Name | DSA-1196 | First vendor Publication | 2006-10-19 |
Vendor | Debian | Last vendor Modification | 2006-10-19 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several remote vulnerabilities have been discovered in the ClamAV malware scan engine, which may lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2006-4182 Damian Put discovered a heap overflow error in the script to rebuild PE files, which could lead to the execution of arbitrary code. CVE-2006-5295 Damian Put discovered that missing input sanitising in the CHM handling code might lead to denial of service. For the stable distribution (sarge) these problems have been fixed in version 0.84-2.sarge.11. Due to technical problems with the build host this update lacks a build for the Sparc architecture. It will be provided soon. For the unstable distribution (sid) these problems have been fixed in version 0.88.5-1. We recommend that you upgrade your clamav packages. |
Original Source
Url : http://www.debian.org/security/2006/dsa-1196 |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for clamav File : nvt/sles9p5010212.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200610-10 (clamav) File : nvt/glsa_200610_10.nasl |
2008-09-04 | Name : FreeBSD Ports: clamav File : nvt/freebsd_clamav9.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1196-1 (clamav) File : nvt/deb_1196_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
29774 | Clam AntiVirus CHM Handling Unspecified Memory Corruption DoS |
29773 | Clam AntiVirus Portable Executable (PE) File Handling Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_clamav-2179.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_clamav-2180.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-184.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2006_060.nasl - Type : ACT_GATHER_INFO |
2006-10-25 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1196.nasl - Type : ACT_GATHER_INFO |
2006-10-25 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200610-10.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:26:16 |
|