CVE-2006-4018
Published Aug 8, 2006
Last updated 6 years ago
Overview
- Description
- Heap-based buffer overflow in the pefromupx function in libclamav/upx.c in Clam AntiVirus (ClamAV) 0.81 through 0.88.3 allows remote attackers to execute arbitrary code via a crafted UPX packed file containing sections with large rsize values.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Evaluator
- Comment
- -
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA719FE4-04E0-4664-8EEC-70CD613408DD" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.81:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F7364D6-36F6-4615-95F0-E0B56722DAAD" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C859F864-B68F-4805-B804-E50F2C3FFE8E" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5CAFEA5-C062-43EA-A302-38887DA6768C" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "525DC218-308C-4A0E-96A7-DC74B8973B62" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.84:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4969C16-F67D-4C30-A537-FE64F4CFC3D0" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.84:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0D72B20-1F61-4499-9ADE-88AF98C3C19C" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72C71B82-8F84-4855-A138-7E7436788D69" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "039341D8-8E2B-4901-BFA6-9CCC46A18C75" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C048A75E-6587-485C-9F2B-E12BED34FF2E" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.86:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97DAD83E-F14F-4B87-B5D8-7BCAD8F446BA" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EC4D448-DDCD-4C0B-AA84-2D054FCF718C" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B003639-3228-4AC1-AB46-73481BB5DDA5" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D6A495D-F9BB-41B9-A912-670D837EA278" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45F5E6B4-88DD-4426-9FB6-D9009F6B8740" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.88:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB1EB857-D417-49EB-89FD-04733C872EE9" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.88.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B9D09D6-3EFD-45A6-88C3-199BF3EF9A42" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.88.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4551D5ED-6C72-4C9B-A556-491042A6113A" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.88.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01859947-09D4-417E-92A4-FA4F1625C60D" } ], "operator": "OR" } ] } ]