CVE-2006-4182

Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, allows remote attackers to cause a denial of service (scanning service crash) and execute arbitrary code via a crafted Portable Executable (PE) file that leads to a heap-based buffer overflow when less memory is allocated than expected.
References
Link Resource
http://docs.info.apple.com/article.html?artnum=304829
http://kolab.org/security/kolab-vendor-notice-13.txt
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=422 Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
http://secunia.com/advisories/22370
http://secunia.com/advisories/22421
http://secunia.com/advisories/22488
http://secunia.com/advisories/22498
http://secunia.com/advisories/22537
http://secunia.com/advisories/22551
http://secunia.com/advisories/22626
http://secunia.com/advisories/23155
http://security.gentoo.org/glsa/glsa-200610-10.xml
http://securitytracker.com/id?1017068
http://www.debian.org/security/2006/dsa-1196
http://www.kb.cert.org/vuls/id/180864 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:184
http://www.novell.com/linux/security/advisories/2006_60_clamav.html
http://www.securityfocus.com/bid/20535
http://www.us-cert.gov/cas/techalerts/TA06-333A.html US Government Resource
http://www.vupen.com/english/advisories/2006/4034
http://www.vupen.com/english/advisories/2006/4136
http://www.vupen.com/english/advisories/2006/4264
http://www.vupen.com/english/advisories/2006/4750
https://exchange.xforce.ibmcloud.com/vulnerabilities/29607
http://docs.info.apple.com/article.html?artnum=304829
http://kolab.org/security/kolab-vendor-notice-13.txt
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=422 Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
http://secunia.com/advisories/22370
http://secunia.com/advisories/22421
http://secunia.com/advisories/22488
http://secunia.com/advisories/22498
http://secunia.com/advisories/22537
http://secunia.com/advisories/22551
http://secunia.com/advisories/22626
http://secunia.com/advisories/23155
http://security.gentoo.org/glsa/glsa-200610-10.xml
http://securitytracker.com/id?1017068
http://www.debian.org/security/2006/dsa-1196
http://www.kb.cert.org/vuls/id/180864 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:184
http://www.novell.com/linux/security/advisories/2006_60_clamav.html
http://www.securityfocus.com/bid/20535
http://www.us-cert.gov/cas/techalerts/TA06-333A.html US Government Resource
http://www.vupen.com/english/advisories/2006/4034
http://www.vupen.com/english/advisories/2006/4136
http://www.vupen.com/english/advisories/2006/4264
http://www.vupen.com/english/advisories/2006/4750
https://exchange.xforce.ibmcloud.com/vulnerabilities/29607
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:.:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.15:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.20:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.21:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.22:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.23:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.24:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.51:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.52:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.53:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.54:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.60:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.60p:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.65:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.67:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.68:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.68.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.70:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.71:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.72:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.73:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.74:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.75:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.75.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc2:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc3:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc4:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.81:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.81_rc1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.82:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.83:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.84:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.84_rc1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.84_rc2:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.85:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.85.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.86:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.86.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.86.2:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.86_rc1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.87:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.87.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.88:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.88.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.88.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:15

Type Values Removed Values Added
References () http://docs.info.apple.com/article.html?artnum=304829 - () http://docs.info.apple.com/article.html?artnum=304829 -
References () http://kolab.org/security/kolab-vendor-notice-13.txt - () http://kolab.org/security/kolab-vendor-notice-13.txt -
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=422 - Patch, Vendor Advisory () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=422 - Patch, Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html - () http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html -
References () http://secunia.com/advisories/22370 - () http://secunia.com/advisories/22370 -
References () http://secunia.com/advisories/22421 - () http://secunia.com/advisories/22421 -
References () http://secunia.com/advisories/22488 - () http://secunia.com/advisories/22488 -
References () http://secunia.com/advisories/22498 - () http://secunia.com/advisories/22498 -
References () http://secunia.com/advisories/22537 - () http://secunia.com/advisories/22537 -
References () http://secunia.com/advisories/22551 - () http://secunia.com/advisories/22551 -
References () http://secunia.com/advisories/22626 - () http://secunia.com/advisories/22626 -
References () http://secunia.com/advisories/23155 - () http://secunia.com/advisories/23155 -
References () http://security.gentoo.org/glsa/glsa-200610-10.xml - () http://security.gentoo.org/glsa/glsa-200610-10.xml -
References () http://securitytracker.com/id?1017068 - () http://securitytracker.com/id?1017068 -
References () http://www.debian.org/security/2006/dsa-1196 - () http://www.debian.org/security/2006/dsa-1196 -
References () http://www.kb.cert.org/vuls/id/180864 - US Government Resource () http://www.kb.cert.org/vuls/id/180864 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:184 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:184 -
References () http://www.novell.com/linux/security/advisories/2006_60_clamav.html - () http://www.novell.com/linux/security/advisories/2006_60_clamav.html -
References () http://www.securityfocus.com/bid/20535 - () http://www.securityfocus.com/bid/20535 -
References () http://www.us-cert.gov/cas/techalerts/TA06-333A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-333A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/4034 - () http://www.vupen.com/english/advisories/2006/4034 -
References () http://www.vupen.com/english/advisories/2006/4136 - () http://www.vupen.com/english/advisories/2006/4136 -
References () http://www.vupen.com/english/advisories/2006/4264 - () http://www.vupen.com/english/advisories/2006/4264 -
References () http://www.vupen.com/english/advisories/2006/4750 - () http://www.vupen.com/english/advisories/2006/4750 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/29607 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/29607 -

Information

Published : 2006-10-16 23:07

Updated : 2024-11-21 00:15


NVD link : CVE-2006-4182

Mitre link : CVE-2006-4182

CVE.ORG link : CVE-2006-4182


JSON object : View

Products Affected

clam_anti-virus

  • clamav