Page 7 of 49 results (0.010 seconds)

CVSS: 6.4EPSS: 13%CPEs: 16EXPL: 1

Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka "CHM name length memory consumption vulnerability." Sophos Anti-Virus y Endpoint Security versiones anteriores a 6.0.5, Anti-Virus para Linux anteriores a 5.0.10, y otras plataformas anteriores a 4.11 permite a atacantes remotos provocar una denegación de servicio (corrupción o agotamiento de memoria) y posiblemente ejecutar código de su elección mediante un fichero CHM mal formado con manipulaciones concretas del segmento de cabecera CHM, también conocido como "vulnerabilidad de agotamiento de memoria en longitud de nombre CHM". • https://www.exploit-db.com/exploits/2911 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451 http://secunia.com/advisories/22591 http://securitytracker.com/id?1017132 http://www.securityfocus.com/bid/20816 http://www.sophos.com/support/knowledgebase/article/7609.html http://www.vupen.com/english/advisories/2006/4239 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 18%CPEs: 16EXPL: 1

Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when "Enabled scanning of archives" is set, allows remote attackers to cause a denial of service (infinite loop) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero. Sophos Anti-Virus y Endpoint Security anteriores a 6.0.5, Anti-virus para Linux 5.0.10, y otras plataformas en versiones anteriores a la 4.11, permite a atacantes remotos causar denegación de servicio (bucle infinito) mediante un fichero RAR mal formado con una sección de Cabecera de Archivo con los campos head_size y pack_size puestos a cero. • https://www.exploit-db.com/exploits/2912 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439 http://secunia.com/advisories/22591 http://securitytracker.com/id?1017132 http://www.securityfocus.com/archive/1/474683/100/0/threaded http://www.securityfocus.com/bid/20816 http://www.securitytracker.com/id?1018450 http://www.sophos.com/support/knowledgebase/article/7609.html http://www.vupen.com/english/advisories/2006/4239 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 10%CPEs: 1EXPL: 0

Sophos Anti-Virus 5.1 allows remote attackers to cause a denial of service (memory consumption) via a file that is compressed with Petite and contains a large number of sections. Sophos Anti-Virus 5.1 permite a atacantes remotos provocar una denegación de servicio (agotamiento de memoria) mediante un fichero comprimido con Petite que contiene un gran número de secciones. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=438 http://secunia.com/advisories/22635 http://securitytracker.com/id?1017132 http://www.securityfocus.com/bid/20816 http://www.sophos.com/support/knowledgebase/article/7609.html http://www.vupen.com/english/advisories/2006/4239 https://exchange.xforce.ibmcloud.com/vulnerabilities/29918 •

CVSS: 7.5EPSS: 93%CPEs: 2EXPL: 0

Multiple Sophos Anti-Virus products, including Anti-Virus for Windows 5.x before 5.2.1 and 4.x before 4.05, when cabinet file inspection is enabled, allows remote attackers to execute arbitrary code via a CAB file with "invalid folder count values," which leads to heap corruption. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sophos AntiVirus. Authentication is not required to exploit this vulnerability. The specific flaw exists within the unpacking of Microsoft Cabinet files that contain invalid folder count values within the CAB header. Parsing of a specially crafted cabinet file can lead to an exploitable heap corruption. This vulnerability is only exposed when cabinet file inspection is explicitly enabled. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/045897.html http://secunia.com/advisories/20028 http://securityreason.com/securityalert/869 http://securitytracker.com/id?1016041 http://www.securityfocus.com/archive/1/433272/100/0/threaded http://www.securityfocus.com/bid/17876 http://www.vupen.com/english/advisories/2006/1730 http://www.zerodayinitiative.com/advisories/ZDI-06-012.html https://exchange.xforce.ibmcloud.com/vulnerabilities/26305 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

Sophos Anti-Virus before 4.02, 4.5.x before 4.5.9, 4.6.x before 4.6.9, and 5.x before 5.1.4 allow remote attackers to hide arbitrary files and data via crafted ARJ archives, which are not properly scanned. • http://www.sophos.com/support/knowledgebase/article/3803.html http://www.vupen.com/english/advisories/2006/0347 https://exchange.xforce.ibmcloud.com/vulnerabilities/24345 •