Page 22 of 145 results (0.015 seconds)

CVSS: 5.0EPSS: 56%CPEs: 6EXPL: 0

The parsing engine in ClamAV before 0.90.3 and 0.91 before 0.91rc1 allows remote attackers to bypass scanning via a RAR file with a header flag value of 10, which can be processed by WinRAR. El motor de análisis sintáctico del ClamAV anterior al 0.90.3 y el 0.91 anterior al 0.91rc1, permite a atacantes remotos evitar el escaneo mediante un fichero RAR con una bandera de la cabecera con valor 10, lo que puede ser procesado por el WinRAR. • http://kolab.org/security/kolab-vendor-notice-15.txt http://lurker.clamav.net/message/20070530.224918.5c64abc4.en.html http://osvdb.org/45392 http://secunia.com/advisories/25523 http://secunia.com/advisories/25525 http://secunia.com/advisories/25688 http://secunia.com/advisories/25796 http://security.gentoo.org/glsa/glsa-200706-05.xml http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog http://www.debian.org/security/2007/dsa-1320 http://www.novell.com/linux/secur •

CVSS: 10.0EPSS: 2%CPEs: 5EXPL: 0

unsp.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1 does not properly calculate the end of a certain buffer, with unknown impact and remote attack vectors. unsp.c en el ClamAV en versiones anteriores a la 0.90.3 y la 0.91 anterior a la 0.91rc1 no calcula adecuadamente el final de ciertos búfer, lo que tiene un impacto desconocido y vectores de ataque remotos. • http://kolab.org/security/kolab-vendor-notice-15.txt http://lurker.clamav.net/message/20070530.224918.5c64abc4.en.html http://osvdb.org/36908 http://secunia.com/advisories/25523 http://secunia.com/advisories/25525 http://secunia.com/advisories/25688 http://secunia.com/advisories/25796 http://security.gentoo.org/glsa/glsa-200706-05.xml http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog http://www.debian.org/security/2007/dsa-1320 http://www.novell.com/linux/secur •

CVSS: 4.3EPSS: 1%CPEs: 3EXPL: 0

The OLE2 parser in Clam AntiVirus (ClamAV) allows remote attackers to cause a denial of service (resource consumption) via an OLE2 file with (1) a large property size or (2) a loop in the FAT file block chain that triggers an infinite loop, as demonstrated via a crafted DOC file. El analazidor sintáctico OLE2 en Clam AntiVirus (ClamAV) permite a atacantes remotos provocar denegación de servicio (consumo de recursos) a través de un archivo OLE2 con (1)un tamaño grande de la propiedad o (2) un bucle en la cadena del bloque del archivo del FAT que dispara un bucle infinito, como se demostró a través de un archivo DOC manipulado. • http://article.gmane.org/gmane.comp.security.virus.clamav.devel/2853 http://kolab.org/security/kolab-vendor-notice-15.txt http://lurker.clamav.net/message/20070418.111144.0df6c5d3.en.html http://secunia.com/advisories/25244 http://secunia.com/advisories/25523 http://secunia.com/advisories/25525 http://secunia.com/advisories/25553 http://secunia.com/advisories/25558 http://secunia.com/advisories/25688 http://secunia.com/advisories/25796 http://security.gentoo.org/glsa/glsa-200706& • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 12%CPEs: 27EXPL: 0

File descriptor leak in the PDF handler in Clam AntiVirus (ClamAV) allows remote attackers to cause a denial of service via a crafted PDF file. Una fuga del descriptor de archivos en el manejador PDF en Clam AntiVirus (ClamAV), permite a atacantes remotos causar una denegación de servicio por medio de un archivo PDF especialmente diseñado. • http://osvdb.org/34916 http://secunia.com/advisories/25028 http://secunia.com/advisories/25189 http://www.debian.org/security/2007/dsa-1281 http://www.mandriva.com/security/advisories?name=MDKSA-2007:098 http://www.securityfocus.com/bid/23656 https://exchange.xforce.ibmcloud.com/vulnerabilities/34083 • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 3%CPEs: 2EXPL: 0

The chm_decompress_stream function in libclamav/chmunpack.c in Clam AntiVirus (ClamAV) before 0.90.2 leaks file descriptors, which has unknown impact and attack vectors involving a crafted CHM file, a different vulnerability than CVE-2007-0897. NOTE: some of these details are obtained from third party information. La función chm_decompress_stream en libclamav/chmunpack.c de Clam AntiVirus (ClamAV) anterior a 0.90.2 filtra descriptores de fichero, lo cual tiene impacto y vectores de ataque desconocidos relacionados con un archivo CHM manipulado, una vulnerabilidad distinta de CVE-2007-0897. NOTA: algunos de estos detalles se han obtenido de información de terceros. • http://docs.info.apple.com/article.html?artnum=307562 http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://osvdb.org/34913 http://secunia.com/advisories/24891 http://secunia.com/advisories/24920 http://secunia.com/advisories/24946 http://secunia.com/advisories/24996 http://secunia.com/advisories/25022 http://secunia.com/advisories/25028 http://secunia.com/advisories/25189 http://secunia.com/advisories/29420 http://security.gentoo.org/glsa/glsa- •