// For flags

CVE-2007-4560

ClamAV Milter - Blackhole-Mode Remote Code Execution

Severity Score

7.6
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

clamav-milter in ClamAV before 0.91.2, when run in black hole mode, allows remote attackers to execute arbitrary commands via shell metacharacters that are used in a certain popen call, involving the "recipient field of sendmail."

clamav-milter en ClamAV anterior a 0.91.2, cuando funciona en modo agujero negro (black hole), permite a atacantes remotos ejecutar comandos de su elección a través de metacaractéres del intérprete de comandos que es utilizado en ciertas llamadas popen, afectando a "el campo recipiente de sendmail".

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-08-24 First Exploit
  • 2007-08-27 CVE Reserved
  • 2007-08-28 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-09-15 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (24)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Clam Anti-virus
Search vendor "Clam Anti-virus"
Clamav
Search vendor "Clam Anti-virus" for product "Clamav"
<= 0.91.1
Search vendor "Clam Anti-virus" for product "Clamav" and version " <= 0.91.1"
-
Affected