Page 15 of 152 results (0.070 seconds)

CVSS: 7.5EPSS: 8%CPEs: 113EXPL: 0

Off-by-one error in the icon_cb function in pe_icons.c in libclamav in ClamAV before 0.96.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information. Error Off-by-oneen en la función icon_cb en pe_icons.c en libclamav en ClamAV anterior v0.96.5 permite a atacantes remotos causar una denegación de servicio (caída memoria y caída de aplicación) o probablemente ejecutar código de su elección a través de vectores no especificados. NOTA: algunos de estos detalles han sido obtenidos de información de terceras partes. • http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=master http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html http://openwall.com/lists/oss-security/2010/12/03/1 http://openwall.com/lists/oss-security/2010 • CWE-189: Numeric Errors •

CVSS: 9.3EPSS: 3%CPEs: 100EXPL: 0

Buffer overflow in the find_stream_bounds function in pdf.c in libclamav in ClamAV before 0.96.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document. NOTE: some of these details are obtained from third party information. Desbordamiento de búfer en la función find_stream_bounds en pdf.c en libclamav en ClamAV, en versiones anteriores a la 0.96.3, permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) o posiblemente ejecutar código de su elección mediante un documento PDF manipulado. NOTA: algunos de estos detalles se han obtenido de información de terceros. • http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=clamav-0.96.3 http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=commit%3Bh=dc5143b4669ae39c79c9af50d569c28c798f33da http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html http://security-tracker.debian.org/tracker/CVE-2010-3434 http://support.apple.com/kb/HT4581 http://www.openwall.com/lists/oss-security/2010/09/22/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 2%CPEs: 1EXPL: 0

Off-by-one error in the parseicon function in libclamav/pe_icons.c in ClamAV 0.96 allows remote attackers to cause a denial of service (crash) via a crafted PE icon that triggers an out-of-bounds read, related to improper rounding during scaling. Error de superación de límite (Off-by-one) en la función parseicon en libclamav/pe_icons.c in ClamAV v0.96 permite a atacantes remotos causar una denegación de servicio (caída) a través de un icono manipulado PE que lanza una lectura fuera de límites, relacionado con un redondeo inadecuado durante el escalado. • http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=clamav-0.96.1 http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blobdiff%3Bf=libclamav/pe_icons.c%3Bh=3f1bc5be69d0f9d84e576814d1a3cc6f40c4ff2c%3Bhp=39a714f05968f9e929576bf171dd0eb58bf06bef%3Bhb=7f0e3bbf77382d9782e0189bf80f5f59a95779b3%3Bhpb=f0eb394501ec21b9fe67f36cbf5db788711d4236 http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html http://secunia.com/advisories/39895 http://www.mandriva.com/security/advisories?name=MDVSA-2010:110 http://ww • CWE-189: Numeric Errors •

CVSS: 4.3EPSS: 1%CPEs: 94EXPL: 0

The cli_pdf function in libclamav/pdf.c in ClamAV before 0.96.1 allows remote attackers to cause a denial of service (crash) via a malformed PDF file, related to an inconsistency in the calculated stream length and the real stream length. La función cli_pdf en libclamav/pdf.c en ClamAV anterior v0.96.1 permite a atacantes remotos causar una denegación de servicio (caída) a través de un archivo PDF manipulado, relacionado con una inconsistencia en la longitud de cadena calculada y la longuitud real de la cadena. • http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=commitdiff%3Bh=f0eb394501ec21b9fe67f36cbf5db788711d4236#patch2 http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055771.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055777.html http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html http://secunia.com/advisories/39895 http://secunia.com/advisories/43752 http://www.mandriva.com/security/advisories?name=MDVSA-2010:110 http://www.securityfocus.com/ •

CVSS: 10.0EPSS: 2%CPEs: 96EXPL: 0

ClamAV before 0.96 does not properly handle the (1) CAB and (2) 7z file formats, which allows remote attackers to bypass virus detection via a crafted archive that is compatible with standard archive utilities. ClamAV anterior a v0.96 no maneja adecuadamente los formatos de archivo (1) CAB y (2) 7z, lo que permite a atacantes remotos evitar la detección de virus a través de un archivo manipulado que es compatible con las utilidades de archivo estándar. • http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=clamav-0.96 http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html http://secunia.com/advisories/39293 http://secunia.com/advisories/39329 http://secunia.com/advisories/39656 http://support.apple.com/kb/HT4312 http://www.mandriva.com/security/advisories?name=MDVSA-2010:082 http://www.openwall.com/lists/ •