CVE-2006-1614

Integer overflow in the cli_scanpe function in the PE header parser (libclamav/pe.c) in Clam AntiVirus (ClamAV) before 0.88.1, when ArchiveMaxFileSize is disabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code.
References
Link Resource
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
http://lists.suse.com/archive/suse-security-announce/2006-Apr/0002.html
http://secunia.com/advisories/19534 Patch Vendor Advisory
http://secunia.com/advisories/19536 Patch Vendor Advisory
http://secunia.com/advisories/19564
http://secunia.com/advisories/19567
http://secunia.com/advisories/19570
http://secunia.com/advisories/19608
http://secunia.com/advisories/20077
http://secunia.com/advisories/23719
http://securitytracker.com/id?1015887
http://sourceforge.net/project/shownotes.php?release_id=407078&group_id=86638 Patch
http://up2date.astaro.com/2006/05/low_up2date_6202.html
http://www.debian.org/security/2006/dsa-1024 Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200604-06.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:067
http://www.osvdb.org/24457
http://www.overflow.pl/adv/clamavupxinteger.txt Exploit Vendor Advisory
http://www.securityfocus.com/archive/1/430405/100/0/threaded
http://www.securityfocus.com/bid/17388
http://www.securityfocus.com/bid/17951
http://www.trustix.org/errata/2006/0020
http://www.us-cert.gov/cas/techalerts/TA06-132A.html US Government Resource
http://www.vupen.com/english/advisories/2006/1258
http://www.vupen.com/english/advisories/2006/1779
https://exchange.xforce.ibmcloud.com/vulnerabilities/25660
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
http://lists.suse.com/archive/suse-security-announce/2006-Apr/0002.html
http://secunia.com/advisories/19534 Patch Vendor Advisory
http://secunia.com/advisories/19536 Patch Vendor Advisory
http://secunia.com/advisories/19564
http://secunia.com/advisories/19567
http://secunia.com/advisories/19570
http://secunia.com/advisories/19608
http://secunia.com/advisories/20077
http://secunia.com/advisories/23719
http://securitytracker.com/id?1015887
http://sourceforge.net/project/shownotes.php?release_id=407078&group_id=86638 Patch
http://up2date.astaro.com/2006/05/low_up2date_6202.html
http://www.debian.org/security/2006/dsa-1024 Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200604-06.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:067
http://www.osvdb.org/24457
http://www.overflow.pl/adv/clamavupxinteger.txt Exploit Vendor Advisory
http://www.securityfocus.com/archive/1/430405/100/0/threaded
http://www.securityfocus.com/bid/17388
http://www.securityfocus.com/bid/17951
http://www.trustix.org/errata/2006/0020
http://www.us-cert.gov/cas/techalerts/TA06-132A.html US Government Resource
http://www.vupen.com/english/advisories/2006/1258
http://www.vupen.com/english/advisories/2006/1779
https://exchange.xforce.ibmcloud.com/vulnerabilities/25660
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:clam_anti-virus:clamav:0.51:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.52:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.53:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.54:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.60:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.65:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.67:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.68:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.68.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.70:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.75.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc2:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc3:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc4:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.81:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.82:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.83:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.84:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.84_rc1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.84_rc2:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.85:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.85.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.86:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.86.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.86.2:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.87:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.87.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.88:*:*:*:*:*:*:*

History

21 Nov 2024, 00:09

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2006/May/msg00003.html - () http://lists.apple.com/archives/security-announce/2006/May/msg00003.html -
References () http://lists.suse.com/archive/suse-security-announce/2006-Apr/0002.html - () http://lists.suse.com/archive/suse-security-announce/2006-Apr/0002.html -
References () http://secunia.com/advisories/19534 - Patch, Vendor Advisory () http://secunia.com/advisories/19534 - Patch, Vendor Advisory
References () http://secunia.com/advisories/19536 - Patch, Vendor Advisory () http://secunia.com/advisories/19536 - Patch, Vendor Advisory
References () http://secunia.com/advisories/19564 - () http://secunia.com/advisories/19564 -
References () http://secunia.com/advisories/19567 - () http://secunia.com/advisories/19567 -
References () http://secunia.com/advisories/19570 - () http://secunia.com/advisories/19570 -
References () http://secunia.com/advisories/19608 - () http://secunia.com/advisories/19608 -
References () http://secunia.com/advisories/20077 - () http://secunia.com/advisories/20077 -
References () http://secunia.com/advisories/23719 - () http://secunia.com/advisories/23719 -
References () http://securitytracker.com/id?1015887 - () http://securitytracker.com/id?1015887 -
References () http://sourceforge.net/project/shownotes.php?release_id=407078&group_id=86638 - Patch () http://sourceforge.net/project/shownotes.php?release_id=407078&group_id=86638 - Patch
References () http://up2date.astaro.com/2006/05/low_up2date_6202.html - () http://up2date.astaro.com/2006/05/low_up2date_6202.html -
References () http://www.debian.org/security/2006/dsa-1024 - Patch, Vendor Advisory () http://www.debian.org/security/2006/dsa-1024 - Patch, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200604-06.xml - () http://www.gentoo.org/security/en/glsa/glsa-200604-06.xml -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:067 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:067 -
References () http://www.osvdb.org/24457 - () http://www.osvdb.org/24457 -
References () http://www.overflow.pl/adv/clamavupxinteger.txt - Exploit, Vendor Advisory () http://www.overflow.pl/adv/clamavupxinteger.txt - Exploit, Vendor Advisory
References () http://www.securityfocus.com/archive/1/430405/100/0/threaded - () http://www.securityfocus.com/archive/1/430405/100/0/threaded -
References () http://www.securityfocus.com/bid/17388 - () http://www.securityfocus.com/bid/17388 -
References () http://www.securityfocus.com/bid/17951 - () http://www.securityfocus.com/bid/17951 -
References () http://www.trustix.org/errata/2006/0020 - () http://www.trustix.org/errata/2006/0020 -
References () http://www.us-cert.gov/cas/techalerts/TA06-132A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-132A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/1258 - () http://www.vupen.com/english/advisories/2006/1258 -
References () http://www.vupen.com/english/advisories/2006/1779 - () http://www.vupen.com/english/advisories/2006/1779 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25660 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25660 -

Information

Published : 2006-04-06 22:04

Updated : 2024-11-21 00:09


NVD link : CVE-2006-1614

Mitre link : CVE-2006-1614

CVE.ORG link : CVE-2006-1614


JSON object : View

Products Affected

clam_anti-virus

  • clamav