Vulnerability Name: | CCN-179528 | ||||||
Published: | 2016-06-08 | ||||||
Updated: | 2016-06-08 | ||||||
Summary: | Clam AntiVirus could allow a remote attacker to execute arbitrary commands on the system, caused by command injection vulnerability. By sending a specially crafted request, an attacker could exploit this vulnerability to execute SCAN and SHUTDOWN commands on the system. | ||||||
CVSS v3 Severity: | 8.2 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H) 7.6 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:F/RL:O/RC:C)
| ||||||
CVSS v2 Severity: | 8.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:C)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: XF Type: UNKNOWN clamav-cmd-exec(179528) Source: CCN Type: NMAP Web site File clamav-exec Source: CCN Type: ClamAV Web site ClamAV | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |