CVE-2006-1989

Buffer overflow in the get_database function in the HTTP client in Freshclam in ClamAV 0.80 to 0.88.1 might allow remote web servers to execute arbitrary code via long HTTP headers.
References
Link Resource
http://kolab.org/security/kolab-vendor-notice-09.txt
http://lists.apple.com/archives/security-announce/2006/Jun/msg00000.html
http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
http://secunia.com/advisories/19874
http://secunia.com/advisories/19880 Exploit Patch Vendor Advisory
http://secunia.com/advisories/19912
http://secunia.com/advisories/19963
http://secunia.com/advisories/19964
http://secunia.com/advisories/20117
http://secunia.com/advisories/20159
http://secunia.com/advisories/20877
http://securitytracker.com/id?1016392
http://www.clamav.net/security/0.88.2.html Exploit Vendor Advisory
http://www.debian.org/security/2006/dsa-1050
http://www.gentoo.org/security/en/glsa/glsa-200605-03.xml
http://www.kb.cert.org/vuls/id/599220 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:080
http://www.novell.com/linux/security/advisories/2006_05_05.html
http://www.osvdb.org/25120
http://www.securityfocus.com/bid/17754 Patch
http://www.trustix.org/errata/2006/0024
http://www.vupen.com/english/advisories/2006/1586
http://www.vupen.com/english/advisories/2006/2566
https://exchange.xforce.ibmcloud.com/vulnerabilities/26182
http://kolab.org/security/kolab-vendor-notice-09.txt
http://lists.apple.com/archives/security-announce/2006/Jun/msg00000.html
http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
http://secunia.com/advisories/19874
http://secunia.com/advisories/19880 Exploit Patch Vendor Advisory
http://secunia.com/advisories/19912
http://secunia.com/advisories/19963
http://secunia.com/advisories/19964
http://secunia.com/advisories/20117
http://secunia.com/advisories/20159
http://secunia.com/advisories/20877
http://securitytracker.com/id?1016392
http://www.clamav.net/security/0.88.2.html Exploit Vendor Advisory
http://www.debian.org/security/2006/dsa-1050
http://www.gentoo.org/security/en/glsa/glsa-200605-03.xml
http://www.kb.cert.org/vuls/id/599220 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:080
http://www.novell.com/linux/security/advisories/2006_05_05.html
http://www.osvdb.org/25120
http://www.securityfocus.com/bid/17754 Patch
http://www.trustix.org/errata/2006/0024
http://www.vupen.com/english/advisories/2006/1586
http://www.vupen.com/english/advisories/2006/2566
https://exchange.xforce.ibmcloud.com/vulnerabilities/26182
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:clam_anti-virus:clamav:0.88:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.88.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:10

Type Values Removed Values Added
References () http://kolab.org/security/kolab-vendor-notice-09.txt - () http://kolab.org/security/kolab-vendor-notice-09.txt -
References () http://lists.apple.com/archives/security-announce/2006/Jun/msg00000.html - () http://lists.apple.com/archives/security-announce/2006/Jun/msg00000.html -
References () http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html - () http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html -
References () http://secunia.com/advisories/19874 - () http://secunia.com/advisories/19874 -
References () http://secunia.com/advisories/19880 - Exploit, Patch, Vendor Advisory () http://secunia.com/advisories/19880 - Exploit, Patch, Vendor Advisory
References () http://secunia.com/advisories/19912 - () http://secunia.com/advisories/19912 -
References () http://secunia.com/advisories/19963 - () http://secunia.com/advisories/19963 -
References () http://secunia.com/advisories/19964 - () http://secunia.com/advisories/19964 -
References () http://secunia.com/advisories/20117 - () http://secunia.com/advisories/20117 -
References () http://secunia.com/advisories/20159 - () http://secunia.com/advisories/20159 -
References () http://secunia.com/advisories/20877 - () http://secunia.com/advisories/20877 -
References () http://securitytracker.com/id?1016392 - () http://securitytracker.com/id?1016392 -
References () http://www.clamav.net/security/0.88.2.html - Exploit, Vendor Advisory () http://www.clamav.net/security/0.88.2.html - Exploit, Vendor Advisory
References () http://www.debian.org/security/2006/dsa-1050 - () http://www.debian.org/security/2006/dsa-1050 -
References () http://www.gentoo.org/security/en/glsa/glsa-200605-03.xml - () http://www.gentoo.org/security/en/glsa/glsa-200605-03.xml -
References () http://www.kb.cert.org/vuls/id/599220 - US Government Resource () http://www.kb.cert.org/vuls/id/599220 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:080 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:080 -
References () http://www.novell.com/linux/security/advisories/2006_05_05.html - () http://www.novell.com/linux/security/advisories/2006_05_05.html -
References () http://www.osvdb.org/25120 - () http://www.osvdb.org/25120 -
References () http://www.securityfocus.com/bid/17754 - Patch () http://www.securityfocus.com/bid/17754 - Patch
References () http://www.trustix.org/errata/2006/0024 - () http://www.trustix.org/errata/2006/0024 -
References () http://www.vupen.com/english/advisories/2006/1586 - () http://www.vupen.com/english/advisories/2006/1586 -
References () http://www.vupen.com/english/advisories/2006/2566 - () http://www.vupen.com/english/advisories/2006/2566 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26182 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26182 -

Information

Published : 2006-05-01 19:06

Updated : 2024-11-21 00:10


NVD link : CVE-2006-1989

Mitre link : CVE-2006-1989

CVE.ORG link : CVE-2006-1989


JSON object : View

Products Affected

clam_anti-virus

  • clamav