CVE-2006-4018
Gravedad CVSS v2.0:
ALTA
Tipo:
CWE-119
Restricción de operaciones inapropiada dentro de los límites del búfer de la memoria
Fecha de publicación:
08/08/2006
Última modificación:
03/04/2025
Descripción
Desbordamiento de búfer basado en montón en la función pefromupx en libclamav/upx.c en Clam AntiVirus (ClamAV) 0.81 hasta 0.88.3 permite a atacantes remotos ejecutar código de su elección mediante un archivo empaquetado UPX manipulado que contiene secciones con valores grandes de rsize.
Impacto
Puntuación base 2.0
7.50
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.81:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.84:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.84:rc2:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.86:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://kolab.org/security/kolab-vendor-notice-10.txt
- http://secunia.com/advisories/21368
- http://secunia.com/advisories/21374
- http://secunia.com/advisories/21433
- http://secunia.com/advisories/21443
- http://secunia.com/advisories/21457
- http://secunia.com/advisories/21497
- http://secunia.com/advisories/21562
- http://security.gentoo.org/glsa/glsa-200608-13.xml
- http://securitytracker.com/id?1016645=
- http://www.clamav.net/security/0.88.4.html
- http://www.debian.org/security/2006/dsa-1153
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A138
- http://www.novell.com/linux/security/advisories/2006_46_clamav.html
- http://www.overflow.pl/adv/clamav_upx_heap.txt
- http://www.securityfocus.com/archive/1/442681/100/0/threaded
- http://www.securityfocus.com/bid/19381
- http://www.trustix.org/errata/2006/0046/
- http://www.vupen.com/english/advisories/2006/3175
- http://www.vupen.com/english/advisories/2006/3275
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28286
- http://kolab.org/security/kolab-vendor-notice-10.txt
- http://secunia.com/advisories/21368
- http://secunia.com/advisories/21374
- http://secunia.com/advisories/21433
- http://secunia.com/advisories/21443
- http://secunia.com/advisories/21457
- http://secunia.com/advisories/21497
- http://secunia.com/advisories/21562
- http://security.gentoo.org/glsa/glsa-200608-13.xml
- http://securitytracker.com/id?1016645=
- http://www.clamav.net/security/0.88.4.html
- http://www.debian.org/security/2006/dsa-1153
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A138
- http://www.novell.com/linux/security/advisories/2006_46_clamav.html
- http://www.overflow.pl/adv/clamav_upx_heap.txt
- http://www.securityfocus.com/archive/1/442681/100/0/threaded
- http://www.securityfocus.com/bid/19381
- http://www.trustix.org/errata/2006/0046/
- http://www.vupen.com/english/advisories/2006/3175
- http://www.vupen.com/english/advisories/2006/3275
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28286