CVE-2008-0728

The unmew11 function in libclamav/mew.c in libclamav in ClamAV before 0.92.1 has unknown impact and attack vectors that trigger "heap corruption."
References
Link Resource
http://bugs.gentoo.org/show_bug.cgi?id=209915
http://docs.info.apple.com/article.html?artnum=307562
http://kolab.org/security/kolab-vendor-notice-19.txt
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html
http://secunia.com/advisories/28907 Vendor Advisory
http://secunia.com/advisories/29001 Vendor Advisory
http://secunia.com/advisories/29026 Vendor Advisory
http://secunia.com/advisories/29048 Vendor Advisory
http://secunia.com/advisories/29060 Vendor Advisory
http://secunia.com/advisories/29420 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200802-09.xml
http://sourceforge.net/project/shownotes.php?release_id=575703 Patch
http://support.novell.com/techcenter/psdb/512985d2cd3090bfb93dcb7b551179cf.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:088
http://www.vupen.com/english/advisories/2008/0503 Vendor Advisory
http://www.vupen.com/english/advisories/2008/0606 Vendor Advisory
http://www.vupen.com/english/advisories/2008/0924/references Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/40474
http://bugs.gentoo.org/show_bug.cgi?id=209915
http://docs.info.apple.com/article.html?artnum=307562
http://kolab.org/security/kolab-vendor-notice-19.txt
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html
http://secunia.com/advisories/28907 Vendor Advisory
http://secunia.com/advisories/29001 Vendor Advisory
http://secunia.com/advisories/29026 Vendor Advisory
http://secunia.com/advisories/29048 Vendor Advisory
http://secunia.com/advisories/29060 Vendor Advisory
http://secunia.com/advisories/29420 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200802-09.xml
http://sourceforge.net/project/shownotes.php?release_id=575703 Patch
http://support.novell.com/techcenter/psdb/512985d2cd3090bfb93dcb7b551179cf.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:088
http://www.vupen.com/english/advisories/2008/0503 Vendor Advisory
http://www.vupen.com/english/advisories/2008/0606 Vendor Advisory
http://www.vupen.com/english/advisories/2008/0924/references Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/40474
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.8:rc3:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.14:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.14:pre:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.21:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.22:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.23:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.24:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.51:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.52:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.53:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.54:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.60:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.60p:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.65:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.66:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.67:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.67-1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.68:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.68.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.70:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.70:rc:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.71:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.72:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.73:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.74:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.75:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.75.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.80:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.80:rc:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.80:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.80:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.80:rc3:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.80:rc4:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.80_rc:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.81:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.84:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.84:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.86:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.4:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.5:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.6:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.7:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.7_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.7_p1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc1.1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc3:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.1_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.2_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.3_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.3_p1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91.2_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.92_p0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:42

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?id=209915 - () http://bugs.gentoo.org/show_bug.cgi?id=209915 -
References () http://docs.info.apple.com/article.html?artnum=307562 - () http://docs.info.apple.com/article.html?artnum=307562 -
References () http://kolab.org/security/kolab-vendor-notice-19.txt - () http://kolab.org/security/kolab-vendor-notice-19.txt -
References () http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html - () http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html -
References () http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html - () http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html -
References () http://secunia.com/advisories/28907 - Vendor Advisory () http://secunia.com/advisories/28907 - Vendor Advisory
References () http://secunia.com/advisories/29001 - Vendor Advisory () http://secunia.com/advisories/29001 - Vendor Advisory
References () http://secunia.com/advisories/29026 - Vendor Advisory () http://secunia.com/advisories/29026 - Vendor Advisory
References () http://secunia.com/advisories/29048 - Vendor Advisory () http://secunia.com/advisories/29048 - Vendor Advisory
References () http://secunia.com/advisories/29060 - Vendor Advisory () http://secunia.com/advisories/29060 - Vendor Advisory
References () http://secunia.com/advisories/29420 - Vendor Advisory () http://secunia.com/advisories/29420 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200802-09.xml - () http://security.gentoo.org/glsa/glsa-200802-09.xml -
References () http://sourceforge.net/project/shownotes.php?release_id=575703 - Patch () http://sourceforge.net/project/shownotes.php?release_id=575703 - Patch
References () http://support.novell.com/techcenter/psdb/512985d2cd3090bfb93dcb7b551179cf.html - () http://support.novell.com/techcenter/psdb/512985d2cd3090bfb93dcb7b551179cf.html -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:088 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:088 -
References () http://www.vupen.com/english/advisories/2008/0503 - Vendor Advisory () http://www.vupen.com/english/advisories/2008/0503 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/0606 - Vendor Advisory () http://www.vupen.com/english/advisories/2008/0606 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/0924/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/0924/references - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/40474 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/40474 -

Information

Published : 2008-02-12 20:00

Updated : 2024-11-21 00:42


NVD link : CVE-2008-0728

Mitre link : CVE-2008-0728

CVE.ORG link : CVE-2008-0728


JSON object : View

Products Affected

clamav

  • clamav
CWE
CWE-399

Resource Management Errors