cpe:2.3:a:clam_anti-virus:clamav:0.90.2:p0:*:*:*:*:*:*
Gibraltar Firewall 2.2 and earlier, when using the ClamAV update to 0.81 for Squid, uses a defunct ClamAV method to scan memory for viruses, which does not return an error code and prevents viruses from being detected.
Max CVSS
7.5
EPSS Score
0.22%
Published
2005-05-24
Updated
2008-09-05
Integer signedness error in the (1) cab_unstore and (2) cab_extract functions in libclamav/cab.c in Clam AntiVirus (ClamAV) before 0.90.2 allow remote attackers to execute arbitrary code via a crafted CHM file that contains a negative integer, which passes a signed comparison and leads to a stack-based buffer overflow.
Max CVSS
7.5
EPSS Score
20.26%
Published
2007-04-16
Updated
2017-07-29
unsp.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1 does not properly calculate the end of a certain buffer, with unknown impact and remote attack vectors.
Max CVSS
10.0
EPSS Score
1.77%
Published
2007-06-07
Updated
2012-10-31
libclamav/others.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1 uses insecure permissions for temporary files that are created by the cli_gentempstream function in clamd/clamdscan, which might allow local users to read sensitive files.
Max CVSS
2.1
EPSS Score
0.04%
Published
2007-06-07
Updated
2008-09-05
Unspecified vulnerability in libclamav/phishcheck.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1, when running on Solaris, allows remote attackers to cause a denial of service (hang) via unknown vectors related to the isURL function and regular expressions.
Max CVSS
5.0
EPSS Score
0.27%
Published
2007-06-07
Updated
2008-09-05
The parsing engine in ClamAV before 0.90.3 and 0.91 before 0.91rc1 allows remote attackers to bypass scanning via a RAR file with a header flag value of 10, which can be processed by WinRAR.
Max CVSS
5.0
EPSS Score
2.05%
Published
2007-06-07
Updated
2017-07-29
unrar.c in libclamav in ClamAV before 0.90.3 and 0.91 before 0.91rc1 allows remote attackers to cause a denial of service (core dump) via a crafted RAR file with a modified vm_codesize value, which triggers a heap-based buffer overflow.
Max CVSS
5.0
EPSS Score
14.62%
Published
2007-06-07
Updated
2017-07-29
ClamAV before 0.91.2, as used in Kolab Server 2.0 through 2.2beta1 and other products, allows remote attackers to cause a denial of service (application crash) via (1) a crafted RTF file, which triggers a NULL dereference in the cli_scanrtf function in libclamav/rtf.c; or (2) a crafted HTML document with a data: URI, which triggers a NULL dereference in the cli_html_normalise function in libclamav/htmlnorm.c. NOTE: some of these details are obtained from third party information.
Max CVSS
4.3
EPSS Score
9.11%
Published
2007-08-23
Updated
2017-07-29

CVE-2007-4560

Public exploit
clamav-milter in ClamAV before 0.91.2, when run in black hole mode, allows remote attackers to execute arbitrary commands via shell metacharacters that are used in a certain popen call, involving the "recipient field of sendmail."
Max CVSS
7.6
EPSS Score
96.53%
Published
2007-08-28
Updated
2018-10-15
Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.
Max CVSS
7.5
EPSS Score
24.62%
Published
2007-12-20
Updated
2017-09-29
Off-by-one error in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MS-ZIP compressed CAB file.
Max CVSS
6.8
EPSS Score
17.51%
Published
2007-12-20
Updated
2017-08-08
Integer overflow in the cli_scanpe function in libclamav in ClamAV before 0.92.1, as used in clamd, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Petite packed PE file, which triggers a heap-based buffer overflow.
Max CVSS
10.0
EPSS Score
53.22%
Published
2008-02-12
Updated
2011-03-07
libclamav/chmunpack.c in the chm-parser in ClamAV before 0.94 allows remote attackers to cause a denial of service (application crash) via a malformed CHM file, related to an "invalid memory access."
Max CVSS
5.0
EPSS Score
11.17%
Published
2008-09-04
Updated
2011-03-08
ClamAV before 0.93 allows remote attackers to bypass the scanning enging via a RAR file with an invalid version number, which cannot be parsed by ClamAV but can be extracted by Winrar.
Max CVSS
5.0
EPSS Score
0.62%
Published
2008-04-16
Updated
2017-08-08
libclamunrar in ClamAV before 0.93 allows remote attackers to cause a denial of service (crash) via crafted RAR files that trigger "memory problems," as demonstrated by the PROTOS GENOME test suite for Archive Formats.
Max CVSS
5.0
EPSS Score
8.78%
Published
2008-04-16
Updated
2017-08-08
libclamav/petite.c in ClamAV before 0.93.1 allows remote attackers to cause a denial of service via a crafted Petite file that triggers an out-of-bounds read.
Max CVSS
5.0
EPSS Score
16.67%
Published
2008-06-16
Updated
2017-08-08
libclamav/petite.c in ClamAV before 0.93.3 allows remote attackers to cause a denial of service via a malformed Petite file that triggers an out-of-bounds memory access. NOTE: this issue exists because of an incomplete fix for CVE-2008-2713.
Max CVSS
5.0
EPSS Score
8.47%
Published
2008-07-18
Updated
2017-08-08
Off-by-one error in the get_unicode_name function (libclamav/vba_extract.c) in Clam Anti-Virus (ClamAV) before 0.94.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted VBA project file, which triggers a heap-based buffer overflow.
Max CVSS
9.3
EPSS Score
5.36%
Published
2008-11-13
Updated
2018-10-11
Stack consumption vulnerability in libclamav/special.c in ClamAV before 0.94.2 allows remote attackers to cause a denial of service (daemon crash) via a crafted JPEG file, related to the cli_check_jpeg_exploit, jpeg_check_photoshop, and jpeg_check_photoshop_8bim functions.
Max CVSS
4.3
EPSS Score
16.21%
Published
2008-12-03
Updated
2017-09-29
19 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!