Vulnerability Details : CVE-2006-6335
Multiple buffer overflows in Sophos Anti-Virus scanning engine before 2.40 allow remote attackers to execute arbitrary code via (1) a SIT archive with a long filename that is not null-terminated, which triggers a heap-based overflow in veex.dll due to improper length calculation, and (2) a CPIO archive, with a long filename that is not null-terminated, which triggers a stack-based overflow in veex.dll.
Vulnerability category: Execute code
Products affected by CVE-2006-6335
- cpe:2.3:a:sophos:sophos_anti-virus:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-6335
12.86%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-6335
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2006-6335
-
http://www.sophos.com/support/knowledgebase/article/17340.html
Vendor Advisory
-
http://secunia.com/advisories/23325
-
http://www.vupen.com/english/advisories/2006/4919
-
http://www.securityfocus.com/archive/1/454211/100/0/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30851
-
http://www.securityfocus.com/bid/21563
-
http://www.sophos.com/support/knowledgebase/article/21637.html
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30852
-
http://www.securityfocus.com/archive/1/454197/100/0/threaded
-
http://www.zerodayinitiative.com/advisories/ZDI-06-046.html
Patch;Vendor Advisory
-
http://www.zerodayinitiative.com/advisories/ZDI-06-045.html
Patch;Vendor Advisory
Jump to