Page 10 of 46 results (0.003 seconds)

CVSS: 6.8EPSS: 8%CPEs: 114EXPL: 0

Double free vulnerability in the vba_read_project_strings function in vba_extract.c in libclamav in ClamAV before 0.97 might allow remote attackers to execute arbitrary code via crafted Visual Basic for Applications (VBA) data in a Microsoft Office document. NOTE: some of these details are obtained from third party information. Doble vulnerabilidad libre en la función vba_read_project_strings en vba_extract.c en libclamav en ClamAV anterior a v0.97, podría permitir a atacantes remotos ejecutar código arbitrario a través de datos de Visual Basic para Aplicaciones (VBA) manipulados en un documento de Microsoft Office. NOTA: algunos de estos detalles han sido obtenidos de información de terceros. • http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob%3Bf=ChangeLog%3Bhb=clamav-0.97 http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=commit%3Bh=d21fb8d975f8c9688894a8cef4d50d977022e09f http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055771.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055777.html http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html http://openwall.com/lists/oss-security/2011/02/21/1 http://openwall.com/lists • CWE-399: Resource Management Errors •