CVE-2008-5050

Off-by-one error in the get_unicode_name function (libclamav/vba_extract.c) in Clam Anti-Virus (ClamAV) before 0.94.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted VBA project file, which triggers a heap-based buffer overflow.
References
Link Resource
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
http://lists.grok.org.uk/pipermail/full-disclosure/2008-November/065530.html Exploit
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
http://secunia.com/advisories/32663 Vendor Advisory
http://secunia.com/advisories/32699
http://secunia.com/advisories/32765
http://secunia.com/advisories/32872
http://secunia.com/advisories/33016
http://secunia.com/advisories/33317
http://secunia.com/advisories/33937
http://security.gentoo.org/glsa/glsa-200812-21.xml
http://securityreason.com/securityalert/4579
http://sourceforge.net/project/shownotes.php?release_id=637952&group_id=86638
http://support.apple.com/kb/HT3438
http://www.debian.org/security/2008/dsa-1680
http://www.mandriva.com/security/advisories?name=MDVSA-2008:229
http://www.securityfocus.com/archive/1/498169/100/0/threaded
http://www.securityfocus.com/bid/32207 Patch
http://www.securitytracker.com/id?1021159
http://www.ubuntu.com/usn/usn-672-1
http://www.vupen.com/english/advisories/2008/3085
http://www.vupen.com/english/advisories/2009/0422
https://exchange.xforce.ibmcloud.com/vulnerabilities/46462
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00332.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00348.html
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
http://lists.grok.org.uk/pipermail/full-disclosure/2008-November/065530.html Exploit
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
http://secunia.com/advisories/32663 Vendor Advisory
http://secunia.com/advisories/32699
http://secunia.com/advisories/32765
http://secunia.com/advisories/32872
http://secunia.com/advisories/33016
http://secunia.com/advisories/33317
http://secunia.com/advisories/33937
http://security.gentoo.org/glsa/glsa-200812-21.xml
http://securityreason.com/securityalert/4579
http://sourceforge.net/project/shownotes.php?release_id=637952&group_id=86638
http://support.apple.com/kb/HT3438
http://www.debian.org/security/2008/dsa-1680
http://www.mandriva.com/security/advisories?name=MDVSA-2008:229
http://www.securityfocus.com/archive/1/498169/100/0/threaded
http://www.securityfocus.com/bid/32207 Patch
http://www.securitytracker.com/id?1021159
http://www.ubuntu.com/usn/usn-672-1
http://www.vupen.com/english/advisories/2008/3085
http://www.vupen.com/english/advisories/2009/0422
https://exchange.xforce.ibmcloud.com/vulnerabilities/46462
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00332.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00348.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.01:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.02:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.03:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.04:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.05:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.06:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.10:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.11:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.12:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.13:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.14:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.14:pre:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.15:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.20:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.21:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.22:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.23:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.24:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.51:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.52:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.53:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.54:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.60:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.60p:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.65:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.67:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.68:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.68.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.70:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.71:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.72:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.73:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.74:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.75:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.75.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80:rc:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80:rc2:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80:rc3:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80:rc4:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc2:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc3:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc4:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.81:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.81:rc1:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.81_rc1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.82:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.83:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.84:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.84:rc1:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.84:rc2:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.84_rc1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.84_rc2:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.85:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.85.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.86:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.86:rc1:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.86.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.86.2:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.86_rc1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.87:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.87.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.88:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.88.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.88.2:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.88.3:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.88.4:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.88.5:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.88.6:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.88.7:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.88.7:p0:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.88.7:p1:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.90:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.90.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.90.1:p0:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.90.2:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.90.2:p0:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.90.3:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.90.3:p0:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.90.3:p1:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.90_rc1.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.90_rc2:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.90_rc3:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.90rc1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.91:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.91.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.91.2:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.91.2:p0:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.91rc1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.91rc2:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.92:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.92:p0:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.92.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.93:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.93.1:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.93.2:*:*:*:*:*:*:*
cpe:2.3:a:clam_anti-virus:clamav:0.93.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:53

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html - () http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html -
References () http://lists.grok.org.uk/pipermail/full-disclosure/2008-November/065530.html - Exploit () http://lists.grok.org.uk/pipermail/full-disclosure/2008-November/065530.html - Exploit
References () http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html -
References () http://secunia.com/advisories/32663 - Vendor Advisory () http://secunia.com/advisories/32663 - Vendor Advisory
References () http://secunia.com/advisories/32699 - () http://secunia.com/advisories/32699 -
References () http://secunia.com/advisories/32765 - () http://secunia.com/advisories/32765 -
References () http://secunia.com/advisories/32872 - () http://secunia.com/advisories/32872 -
References () http://secunia.com/advisories/33016 - () http://secunia.com/advisories/33016 -
References () http://secunia.com/advisories/33317 - () http://secunia.com/advisories/33317 -
References () http://secunia.com/advisories/33937 - () http://secunia.com/advisories/33937 -
References () http://security.gentoo.org/glsa/glsa-200812-21.xml - () http://security.gentoo.org/glsa/glsa-200812-21.xml -
References () http://securityreason.com/securityalert/4579 - () http://securityreason.com/securityalert/4579 -
References () http://sourceforge.net/project/shownotes.php?release_id=637952&group_id=86638 - () http://sourceforge.net/project/shownotes.php?release_id=637952&group_id=86638 -
References () http://support.apple.com/kb/HT3438 - () http://support.apple.com/kb/HT3438 -
References () http://www.debian.org/security/2008/dsa-1680 - () http://www.debian.org/security/2008/dsa-1680 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:229 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:229 -
References () http://www.securityfocus.com/archive/1/498169/100/0/threaded - () http://www.securityfocus.com/archive/1/498169/100/0/threaded -
References () http://www.securityfocus.com/bid/32207 - Patch () http://www.securityfocus.com/bid/32207 - Patch
References () http://www.securitytracker.com/id?1021159 - () http://www.securitytracker.com/id?1021159 -
References () http://www.ubuntu.com/usn/usn-672-1 - () http://www.ubuntu.com/usn/usn-672-1 -
References () http://www.vupen.com/english/advisories/2008/3085 - () http://www.vupen.com/english/advisories/2008/3085 -
References () http://www.vupen.com/english/advisories/2009/0422 - () http://www.vupen.com/english/advisories/2009/0422 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/46462 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/46462 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00332.html - () https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00332.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00348.html - () https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00348.html -

Information

Published : 2008-11-13 02:30

Updated : 2024-11-21 00:53


NVD link : CVE-2008-5050

Mitre link : CVE-2008-5050

CVE.ORG link : CVE-2008-5050


JSON object : View

Products Affected

clam_anti-virus

  • clamav
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer