Vulnerabilidad en unmew11 en el archivo libclamav/mew.c en libclamav en ClamAV (CVE-2008-0728)
Gravedad CVSS v2.0:
ALTA
Tipo:
CWE-399
Error en la gestión de recursos
Fecha de publicación:
12/02/2008
Última modificación:
09/04/2025
Descripción
La función unmew11 en el archivo libclamav/mew.c en libclamav en ClamAV versiones anteriores a 0.92.1, presenta un impacto desconocido y vectores de ataque que desencadenan "heap corruption".
Impacto
Puntuación base 2.0
10.00
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:* | 0.92 (incluyendo) | |
cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.8:rc3:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.14:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.14:pre:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://bugs.gentoo.org/show_bug.cgi?id=209915
- http://docs.info.apple.com/article.html?artnum=307562
- http://kolab.org/security/kolab-vendor-notice-19.txt
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html
- http://secunia.com/advisories/28907
- http://secunia.com/advisories/29001
- http://secunia.com/advisories/29026
- http://secunia.com/advisories/29048
- http://secunia.com/advisories/29060
- http://secunia.com/advisories/29420
- http://security.gentoo.org/glsa/glsa-200802-09.xml
- http://sourceforge.net/project/shownotes.php?release_id=575703
- http://support.novell.com/techcenter/psdb/512985d2cd3090bfb93dcb7b551179cf.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A088
- http://www.vupen.com/english/advisories/2008/0503
- http://www.vupen.com/english/advisories/2008/0606
- http://www.vupen.com/english/advisories/2008/0924/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40474
- http://bugs.gentoo.org/show_bug.cgi?id=209915
- http://docs.info.apple.com/article.html?artnum=307562
- http://kolab.org/security/kolab-vendor-notice-19.txt
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html
- http://secunia.com/advisories/28907
- http://secunia.com/advisories/29001
- http://secunia.com/advisories/29026
- http://secunia.com/advisories/29048
- http://secunia.com/advisories/29060
- http://secunia.com/advisories/29420
- http://security.gentoo.org/glsa/glsa-200802-09.xml
- http://sourceforge.net/project/shownotes.php?release_id=575703
- http://support.novell.com/techcenter/psdb/512985d2cd3090bfb93dcb7b551179cf.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A088
- http://www.vupen.com/english/advisories/2008/0503
- http://www.vupen.com/english/advisories/2008/0606
- http://www.vupen.com/english/advisories/2008/0924/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40474