Page 6 of 61 results (0.007 seconds)

CVSS: 5.0EPSS: 26%CPEs: 6EXPL: 0

unrar.c in libclamav in ClamAV before 0.90.3 and 0.91 before 0.91rc1 allows remote attackers to cause a denial of service (core dump) via a crafted RAR file with a modified vm_codesize value, which triggers a heap-based buffer overflow. El unrar.c en libclamav del ClamAV en versiones anteriores a 0.90.3 y la 0.91 en versiones anteriores a 0.91rc1 permite a atacantes remotos provocar una denegación del servicio (volado de memoria tras un error en ejecución) a través de un fichero RAR manipulado con un valor vm_codesize modificado, lo cual dispara un desbordamiento de búfer basado en montículo. • http://kolab.org/security/kolab-vendor-notice-15.txt http://lurker.clamav.net/message/20070530.224918.5c64abc4.en.html http://osvdb.org/35522 http://secunia.com/advisories/25523 http://secunia.com/advisories/25525 http://secunia.com/advisories/25688 http://secunia.com/advisories/25796 http://security.gentoo.org/glsa/glsa-200706-05.xml http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog http://www.debian.org/security/2007/dsa-1320 http://www.novell.com/linux/secur •

CVSS: 5.0EPSS: 55%CPEs: 6EXPL: 0

The parsing engine in ClamAV before 0.90.3 and 0.91 before 0.91rc1 allows remote attackers to bypass scanning via a RAR file with a header flag value of 10, which can be processed by WinRAR. El motor de análisis sintáctico del ClamAV anterior al 0.90.3 y el 0.91 anterior al 0.91rc1, permite a atacantes remotos evitar el escaneo mediante un fichero RAR con una bandera de la cabecera con valor 10, lo que puede ser procesado por el WinRAR. • http://kolab.org/security/kolab-vendor-notice-15.txt http://lurker.clamav.net/message/20070530.224918.5c64abc4.en.html http://osvdb.org/45392 http://secunia.com/advisories/25523 http://secunia.com/advisories/25525 http://secunia.com/advisories/25688 http://secunia.com/advisories/25796 http://security.gentoo.org/glsa/glsa-200706-05.xml http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog http://www.debian.org/security/2007/dsa-1320 http://www.novell.com/linux/secur •

CVSS: 7.8EPSS: 9%CPEs: 27EXPL: 0

File descriptor leak in the PDF handler in Clam AntiVirus (ClamAV) allows remote attackers to cause a denial of service via a crafted PDF file. Una fuga del descriptor de archivos en el manejador PDF en Clam AntiVirus (ClamAV), permite a atacantes remotos causar una denegación de servicio por medio de un archivo PDF especialmente diseñado. • http://osvdb.org/34916 http://secunia.com/advisories/25028 http://secunia.com/advisories/25189 http://www.debian.org/security/2007/dsa-1281 http://www.mandriva.com/security/advisories?name=MDKSA-2007:098 http://www.securityfocus.com/bid/23656 https://exchange.xforce.ibmcloud.com/vulnerabilities/34083 • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 3%CPEs: 2EXPL: 0

The chm_decompress_stream function in libclamav/chmunpack.c in Clam AntiVirus (ClamAV) before 0.90.2 leaks file descriptors, which has unknown impact and attack vectors involving a crafted CHM file, a different vulnerability than CVE-2007-0897. NOTE: some of these details are obtained from third party information. La función chm_decompress_stream en libclamav/chmunpack.c de Clam AntiVirus (ClamAV) anterior a 0.90.2 filtra descriptores de fichero, lo cual tiene impacto y vectores de ataque desconocidos relacionados con un archivo CHM manipulado, una vulnerabilidad distinta de CVE-2007-0897. NOTA: algunos de estos detalles se han obtenido de información de terceros. • http://docs.info.apple.com/article.html?artnum=307562 http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://osvdb.org/34913 http://secunia.com/advisories/24891 http://secunia.com/advisories/24920 http://secunia.com/advisories/24946 http://secunia.com/advisories/24996 http://secunia.com/advisories/25022 http://secunia.com/advisories/25028 http://secunia.com/advisories/25189 http://secunia.com/advisories/29420 http://security.gentoo.org/glsa/glsa- •

CVSS: 7.5EPSS: 20%CPEs: 6EXPL: 0

Integer signedness error in the (1) cab_unstore and (2) cab_extract functions in libclamav/cab.c in Clam AntiVirus (ClamAV) before 0.90.2 allow remote attackers to execute arbitrary code via a crafted CHM file that contains a negative integer, which passes a signed comparison and leads to a stack-based buffer overflow. Error de presencia de signo en entero en las funciones (1) cab_unstore y (2) cab_extract en libclamav/cab.c de Clam AntiVirus (ClamAV) anterior a 0.90.2 permite a atacantes remotos ejecutar código de su elección mediante un archivo CHM manipulado que contiene un entero negativo, que pasa una comparación con signo y lleva a un desbordamiento de búfer basado en pila. • http://docs.info.apple.com/article.html?artnum=307562 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=513 http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://secunia.com/advisories/24891 http://secunia.com/advisories/24920 http://secunia.com/advisories/24946 http://secunia.com/advisories/24996 http://secunia.com/advisories/25022 http://secunia.com/advisories/25028 http://secunia.com/advisories/25189 http://secunia.com/advisories/29420&# •