CVE-2006-4018
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
08/08/2006
Last modified:
03/04/2025
Description
Heap-based buffer overflow in the pefromupx function in libclamav/upx.c in Clam AntiVirus (ClamAV) 0.81 through 0.88.3 allows remote attackers to execute arbitrary code via a crafted UPX packed file containing sections with large rsize values.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.81:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.84:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.84:rc2:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.86:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://kolab.org/security/kolab-vendor-notice-10.txt
- http://secunia.com/advisories/21368
- http://secunia.com/advisories/21374
- http://secunia.com/advisories/21433
- http://secunia.com/advisories/21443
- http://secunia.com/advisories/21457
- http://secunia.com/advisories/21497
- http://secunia.com/advisories/21562
- http://security.gentoo.org/glsa/glsa-200608-13.xml
- http://securitytracker.com/id?1016645=
- http://www.clamav.net/security/0.88.4.html
- http://www.debian.org/security/2006/dsa-1153
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A138
- http://www.novell.com/linux/security/advisories/2006_46_clamav.html
- http://www.overflow.pl/adv/clamav_upx_heap.txt
- http://www.securityfocus.com/archive/1/442681/100/0/threaded
- http://www.securityfocus.com/bid/19381
- http://www.trustix.org/errata/2006/0046/
- http://www.vupen.com/english/advisories/2006/3175
- http://www.vupen.com/english/advisories/2006/3275
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28286
- http://kolab.org/security/kolab-vendor-notice-10.txt
- http://secunia.com/advisories/21368
- http://secunia.com/advisories/21374
- http://secunia.com/advisories/21433
- http://secunia.com/advisories/21443
- http://secunia.com/advisories/21457
- http://secunia.com/advisories/21497
- http://secunia.com/advisories/21562
- http://security.gentoo.org/glsa/glsa-200608-13.xml
- http://securitytracker.com/id?1016645=
- http://www.clamav.net/security/0.88.4.html
- http://www.debian.org/security/2006/dsa-1153
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A138
- http://www.novell.com/linux/security/advisories/2006_46_clamav.html
- http://www.overflow.pl/adv/clamav_upx_heap.txt
- http://www.securityfocus.com/archive/1/442681/100/0/threaded
- http://www.securityfocus.com/bid/19381
- http://www.trustix.org/errata/2006/0046/
- http://www.vupen.com/english/advisories/2006/3175
- http://www.vupen.com/english/advisories/2006/3275
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28286