Page 23 of 142 results (0.006 seconds)

CVSS: 5.0EPSS: 9%CPEs: 1EXPL: 0

Clam AntiVirus (ClamAV) 0.88.6 allows remote attackers to cause a denial of service (stack overflow and application crash) by wrapping many layers of multipart/mixed content around a document, a different vulnerability than CVE-2006-5874 and CVE-2006-6406. Clam AntiVirus (ClamAV) 0.88.6 permite a atacantes remotos provocar una denegación de servicio (desbordamiento de pila y caída de aplicación) encapsulando un documento con muchas capas de contenido multiparte/mezclado (multipart/mixed), una vulnerabilidad distinta de CVE-2006-5874 y CVE-2006-6406. • http://docs.info.apple.com/article.html?artnum=307562 http://kolab.org/security/kolab-vendor-notice-14.txt http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://osvdb.org/31283 http://secunia.com/advisories/23347 http://secunia.com/advisories/23362 http://secunia.com/advisories/23379 http://secunia.com/advisories/23404 http://secunia.com/advisories/23411 http://secunia.com/advisories/23417 http://secunia.com/advisories/23460 http://secunia.com •

CVSS: 5.0EPSS: 20%CPEs: 1EXPL: 1

Clam AntiVirus (ClamAV) 0.88.6 allows remote attackers to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file. Clam AntiVirus (ClamAV) 0.88.6 permite a atacantes remotos evitar una detección de virus, insertando caracteres inválidos en un contenido codificado base64 en un fichero MIME multipart/mixed, como se demuestra con el fichero de testeo EICAR. • http://kolab.org/security/kolab-vendor-notice-14.txt http://secunia.com/advisories/23362 http://secunia.com/advisories/23379 http://secunia.com/advisories/23411 http://secunia.com/advisories/23460 http://www.debian.org/security/2006/dsa-1238 http://www.mandriva.com/security/advisories?name=MDKSA-2006:230 http://www.novell.com/linux/security/advisories/2006_78_clamav.html http://www.quantenblog.net/security/virus-scanner-bypass http://www.securityfocus.com/archive/1/453654/100&#x •

CVSS: 5.0EPSS: 8%CPEs: 22EXPL: 0

Clam AntiVirus (ClamAV) 0.88 and earlier allows remote attackers to cause a denial of service (crash) via a malformed base64-encoded MIME attachment that triggers a null pointer dereference. Clam AntiVirus (ClamAV) 0.88 y versiones anteriores permite a atacantes remotos provocar una denegación de servicio (caída) mediante un adjunto MIME codificado-base64 mal formado que dispara una referencia a puntero null. • http://secunia.com/advisories/23327 http://secunia.com/advisories/23362 http://secunia.com/advisories/23411 http://www.debian.org/security/2006/dsa-1232 http://www.mandriva.com/security/advisories?name=MDKSA-2006:230 http://www.novell.com/linux/security/advisories/2006_78_clamav.html http://www.securityfocus.com/bid/21510 •

CVSS: 5.0EPSS: 47%CPEs: 48EXPL: 1

Unspecified vulnerability in ClamAV before 0.88.5 allows remote attackers to cause a denial of service (scanning service crash) via a crafted Compressed HTML Help (CHM) file that causes ClamAV to "read an invalid memory location." Vulnerabilidad no especificada en ClamAV anterior a 0.88.5 permite a atacantes remotos provocar una denegación de servicio (caída del servicio de escaneo) mediante un archivo de Ayuda HTML comprimida (CHM) creado artesanalmente que hace que ClamAV lea una posición de memoria inválida. • https://www.exploit-db.com/exploits/2586 http://kolab.org/security/kolab-vendor-notice-13.txt http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=423 http://secunia.com/advisories/22370 http://secunia.com/advisories/22421 http://secunia.com/advisories/22488 http://secunia.com/advisories/22498 http://secunia.com/advisories/22537 http://secunia.com/advisories/22551 http://secunia.com/advisories/22626 http://security.gentoo.org/glsa/glsa-200610-10.xml http:/&# •

CVSS: 7.5EPSS: 36%CPEs: 48EXPL: 1

Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, allows remote attackers to cause a denial of service (scanning service crash) and execute arbitrary code via a crafted Portable Executable (PE) file that leads to a heap-based buffer overflow when less memory is allocated than expected. Desbordamiento de entero en ClamAV 0.88.1 y 0.88.4, y otras versiones anteriores a 0.88.5, permite a atacantes remotos provocar una denegación de servicio (caída del servicio de escaneo) y ejecutar código de su elección mediante un Ejecutable Portátil (Portable Executable, PE) creado artesanalmente, que provoca un desbordamiento de búfer basado en montón cuando se ha reservado menos memoria de la esperada. • https://www.exploit-db.com/exploits/2587 http://docs.info.apple.com/article.html?artnum=304829 http://kolab.org/security/kolab-vendor-notice-13.txt http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=422 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/22370 http://secunia.com/advisories/22421 http://secunia.com/advisories/22488 http://secunia.com/advisories/22498 http://secunia.com/advisories/22537 http:/ •