CVE-2011-1003

Double free vulnerability in the vba_read_project_strings function in vba_extract.c in libclamav in ClamAV before 0.97 might allow remote attackers to execute arbitrary code via crafted Visual Basic for Applications (VBA) data in a Microsoft Office document. NOTE: some of these details are obtained from third party information.
References
Link Resource
http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob%3Bf=ChangeLog%3Bhb=clamav-0.97
http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=commit%3Bh=d21fb8d975f8c9688894a8cef4d50d977022e09f
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055771.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055777.html
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
http://openwall.com/lists/oss-security/2011/02/21/1
http://openwall.com/lists/oss-security/2011/02/21/4
http://osvdb.org/70937
http://secunia.com/advisories/43392 Vendor Advisory
http://secunia.com/advisories/43498
http://secunia.com/advisories/43752
http://securitytracker.com/id?1025100
http://www.mandriva.com/en/support/security/advisories/?name=MDVA-2011:007
http://www.securityfocus.com/bid/46470
http://www.ubuntu.com/usn/USN-1076-1
http://www.vupen.com/english/advisories/2011/0453 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0458 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0523
https://exchange.xforce.ibmcloud.com/vulnerabilities/65544
https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2486
http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob%3Bf=ChangeLog%3Bhb=clamav-0.97
http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=commit%3Bh=d21fb8d975f8c9688894a8cef4d50d977022e09f
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055771.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055777.html
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
http://openwall.com/lists/oss-security/2011/02/21/1
http://openwall.com/lists/oss-security/2011/02/21/4
http://osvdb.org/70937
http://secunia.com/advisories/43392 Vendor Advisory
http://secunia.com/advisories/43498
http://secunia.com/advisories/43752
http://securitytracker.com/id?1025100
http://www.mandriva.com/en/support/security/advisories/?name=MDVA-2011:007
http://www.securityfocus.com/bid/46470
http://www.ubuntu.com/usn/USN-1076-1
http://www.vupen.com/english/advisories/2011/0453 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0458 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0523
https://exchange.xforce.ibmcloud.com/vulnerabilities/65544
https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2486
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.8:rc3:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.14:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.14:pre:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.21:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.22:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.23:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.24:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.51:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.52:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.53:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.54:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.60:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.60p:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.65:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.66:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.67:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.67-1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.68:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.68.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.70:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.70:rc:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.71:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.72:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.73:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.74:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.75:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.75.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.80:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.80:rc:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.80:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.80:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.80:rc3:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.80:rc4:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.80_rc:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.81:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.84:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.84:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.86:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.4:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.5:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.6:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.7:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.7_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.88.7_p1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc1.1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc3:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.1_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.2_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.3_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.3_p1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91.2_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.92:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.92.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.92_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.93:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.93.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.93.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.93.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.94:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.94.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.94.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95:src1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95:src2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:25

Type Values Removed Values Added
References () http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob%3Bf=ChangeLog%3Bhb=clamav-0.97 - () http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob%3Bf=ChangeLog%3Bhb=clamav-0.97 -
References () http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=commit%3Bh=d21fb8d975f8c9688894a8cef4d50d977022e09f - () http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=commit%3Bh=d21fb8d975f8c9688894a8cef4d50d977022e09f -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055771.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055771.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055777.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055777.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html -
References () http://openwall.com/lists/oss-security/2011/02/21/1 - () http://openwall.com/lists/oss-security/2011/02/21/1 -
References () http://openwall.com/lists/oss-security/2011/02/21/4 - () http://openwall.com/lists/oss-security/2011/02/21/4 -
References () http://osvdb.org/70937 - () http://osvdb.org/70937 -
References () http://secunia.com/advisories/43392 - Vendor Advisory () http://secunia.com/advisories/43392 - Vendor Advisory
References () http://secunia.com/advisories/43498 - () http://secunia.com/advisories/43498 -
References () http://secunia.com/advisories/43752 - () http://secunia.com/advisories/43752 -
References () http://securitytracker.com/id?1025100 - () http://securitytracker.com/id?1025100 -
References () http://www.mandriva.com/en/support/security/advisories/?name=MDVA-2011:007 - () http://www.mandriva.com/en/support/security/advisories/?name=MDVA-2011:007 -
References () http://www.securityfocus.com/bid/46470 - () http://www.securityfocus.com/bid/46470 -
References () http://www.ubuntu.com/usn/USN-1076-1 - () http://www.ubuntu.com/usn/USN-1076-1 -
References () http://www.vupen.com/english/advisories/2011/0453 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0453 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0458 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0458 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0523 - () http://www.vupen.com/english/advisories/2011/0523 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/65544 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/65544 -
References () https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2486 - () https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2486 -

07 Nov 2023, 02:06

Type Values Removed Values Added
Summary Double free vulnerability in the vba_read_project_strings function in vba_extract.c in libclamav in ClamAV before 0.97 might allow remote attackers to execute arbitrary code via crafted Visual Basic for Applications (VBA) data in a Microsoft Office document. NOTE: some of these details are obtained from third party information. Double free vulnerability in the vba_read_project_strings function in vba_extract.c in libclamav in ClamAV before 0.97 might allow remote attackers to execute arbitrary code via crafted Visual Basic for Applications (VBA) data in a Microsoft Office document. NOTE: some of these details are obtained from third party information.

Information

Published : 2011-02-23 19:00

Updated : 2024-11-21 01:25


NVD link : CVE-2011-1003

Mitre link : CVE-2011-1003

CVE.ORG link : CVE-2011-1003


JSON object : View

Products Affected

clamav

  • clamav
CWE
CWE-399

Resource Management Errors