Vulnerability Details : CVE-2006-1615
Multiple format string vulnerabilities in the logging code in Clam AntiVirus (ClamAV) before 0.88.1 might allow remote attackers to execute arbitrary code. NOTE: as of 20060410, it is unclear whether this is a vulnerability, as there is some evidence that the arguments are actually being sanitized properly.
Vulnerability category: Execute code
Products affected by CVE-2006-1615
- cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.14:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.21:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.22:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.71:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.72:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.73:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.74:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.84:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.84:rc2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.60p:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.68:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.67:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.70:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.54:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.60:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.52:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.53:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.80:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.80:rc2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.80:rc3:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.80:rc4:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.86:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.67-1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.14:pre:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.51:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.24:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.75.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.80:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.66:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.65:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.68.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.23:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.70:rc:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.75:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.8:rc3:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.80:rc:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.81:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-1615
36.76%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1615
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2006-1615
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-1615
-
http://www.vupen.com/english/advisories/2006/1779
Site en constructionVendor Advisory
-
http://secunia.com/advisories/19608
About Secunia Research | FlexeraPatch;Vendor Advisory
-
http://www.gentoo.org/security/en/glsa/glsa-200604-06.xml
ClamAV: Multiple vulnerabilities (GLSA 200604-06) — Gentoo securityPatch;Vendor Advisory
-
http://secunia.com/advisories/19534
About Secunia Research | FlexeraPatch;Vendor Advisory
-
http://www.osvdb.org/24458
404 Not Found
-
http://lists.suse.com/archive/suse-security-announce/2006-Apr/0002.html
Object not found!Patch;Vendor Advisory
-
http://www.vupen.com/english/advisories/2006/1258
Site en constructionVendor Advisory
-
http://secunia.com/advisories/19564
About Secunia Research | FlexeraPatch;Vendor Advisory
-
http://secunia.com/advisories/20077
About Secunia Research | FlexeraVendor Advisory
-
http://www.securityfocus.com/bid/17951
-
http://secunia.com/advisories/23719
About Secunia Research | FlexeraVendor Advisory
-
http://www.securityfocus.com/bid/17388
Patch
-
http://secunia.com/advisories/19567
About Secunia Research | FlexeraVendor Advisory
-
http://secunia.com/advisories/19536
About Secunia Research | FlexeraPatch;Vendor Advisory
-
http://www.trustix.org/errata/2006/0020
Trustix | Empowering Trust and Security in the Digital Age
-
http://sourceforge.net/project/shownotes.php?release_id=407078&group_id=86638
Clam AntiVirus download | SourceForge.netPatch
-
http://www.us-cert.gov/cas/techalerts/TA06-132A.html
Page Not Found | CISAUS Government Resource
-
http://www.debian.org/security/2006/dsa-1024
[SECURITY] [DSA 1024-1] New clamav packages fix several vulnerabilitiesPatch;Vendor Advisory
-
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
Apple - Lists.apple.com
-
http://up2date.astaro.com/2006/05/low_up2date_6202.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25661
-
http://secunia.com/advisories/19570
About Secunia Research | FlexeraPatch;Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:067
Mandriva
Jump to