Page 14 of 152 results (0.023 seconds)

CVSS: 4.3EPSS: 2%CPEs: 43EXPL: 0

The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c. El motor de código de bytes en ClamAV anterior a v0.97.3 permite a atacantes remotos causar una denegación de servicio (caída) a través de vectores relacionados con el "nivel de recursividad" y (1) libclamav / bytecode.c y (2) libclamav / bytecode_api.c. • http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=commitdiff%3Bh=3d664817f6ef833a17414a4ecea42004c35cc42f http://lists.fedoraproject.org/pipermail/package-announce/2011-November/068940.html http://lists.fedoraproject.org/pipermail/package-announce/2011-November/068941.html http://lists.fedoraproject.org/pipermail/package-announce/2011-November/068942.html http://secunia.com/advisories/46717 http://secunia.com/advisories/46826 http://www.openwall.com/lists/oss-security/2011/10/18/1 http://www.securityfocus.com& • CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 7%CPEs: 117EXPL: 0

Off-by-one error in the cli_hm_scan function in matcher-hash.c in libclamav in ClamAV before 0.97.2 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message that is not properly handled during certain hash calculations. Error "off-by-one" (desbordamiento en un elemento del array) en la función cli_hm_scan de matcher-hash.c de libclamav de ClamAV en versiones anteriores a la 0.97.2 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) a través de un correo electrónico que no es apropiadamente manejado durante determinados cálculos de hash. • http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=clamav-0.97.2 http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=commit%3Bh=4842733eb3f09be61caeed83778bb6679141dbc5 http://lists.fedoraproject.org/pipermail/package-announce/2011-November/068940.html http://lists.fedoraproject.org/pipermail/package-announce/2011-November/068941.html http://lists.fedoraproject.org/pipermail/package-announce/2011-November/068942.html http://secunia.com/advisories/45382 http://secunia.com/advisories • CWE-189: Numeric Errors •

CVSS: 6.8EPSS: 8%CPEs: 114EXPL: 0

Double free vulnerability in the vba_read_project_strings function in vba_extract.c in libclamav in ClamAV before 0.97 might allow remote attackers to execute arbitrary code via crafted Visual Basic for Applications (VBA) data in a Microsoft Office document. NOTE: some of these details are obtained from third party information. Doble vulnerabilidad libre en la función vba_read_project_strings en vba_extract.c en libclamav en ClamAV anterior a v0.97, podría permitir a atacantes remotos ejecutar código arbitrario a través de datos de Visual Basic para Aplicaciones (VBA) manipulados en un documento de Microsoft Office. NOTA: algunos de estos detalles han sido obtenidos de información de terceros. • http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob%3Bf=ChangeLog%3Bhb=clamav-0.97 http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=commit%3Bh=d21fb8d975f8c9688894a8cef4d50d977022e09f http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055771.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055777.html http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html http://openwall.com/lists/oss-security/2011/02/21/1 http://openwall.com/lists • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 16%CPEs: 113EXPL: 0

Multiple unspecified vulnerabilities in pdf.c in libclamav in ClamAV before 0.96.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document, aka (1) "bb #2358" and (2) "bb #2396." Múltiples vulnerabilidades no especificadas en pdf.c en libclamav en ClamAV, en versiones anteriores a la 0.96.5, permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) o posiblemente ejecutar código de su elección mediante un documento PDF manipulado, también conocido como (1) "bb #2358" y (2) "bb #2396." • http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=master http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html http://openwall.com/lists/oss-security/2010/12/03/1 http://openwall.com/lists/oss-security/2010 •

CVSS: 7.5EPSS: 11%CPEs: 113EXPL: 0

Unspecified vulnerability in pdf.c in libclamav in ClamAV before 0.96.5 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document, aka "bb #2380," a different vulnerability than CVE-2010-4260. Vulnerabilidad no especificada en pdf.c en libclamav en ClamAV antes de v0.96.5 permite a atacantes remotos causar una denegación de servicio (caída de aplicación) o posiblemente ejecutar código arbitrario a través de un documento PDF debidamente modificado. Se trata de una vulnerabilidad también conocida como "BB # 2380,". Es una vulnerabilidad diferente a CVE-2010-4260. • http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=master http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html http://openwall.com/lists/oss-security/2010/12/03/1 http://openwall.com/lists/oss-security/2010 •