Vulnerability Name: | CVE-2005-1795 (CCN-20790) | ||||||||
Assigned: | 2005-05-27 | ||||||||
Published: | 2005-05-27 | ||||||||
Updated: | 2016-05-25 | ||||||||
Summary: | The filecopy function in misc.c in Clam AntiVirus (ClamAV) before 0.85, on Mac OS, allows remote attackers to execute arbitrary code via a virus in a filename that contains shell metacharacters, which are not properly handled when HFS permissions prevent the file from being deleted and ditto is invoked. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-20 | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: MITRE Type: CNA CVE-2005-1795 Source: CCN Type: SECTRACK ID: 1014070 Clam AntiVirus on Mac OS Lets Local Users Gain Elevated Privileges Source: SECTRACK Type: Patch, Vendor Advisory 1014070 Source: CCN Type: SourceForge.net Project: Clam AntiVirus: File List Project: Clam AntiVirus: File List Source: CCN Type: Clam AntiVirus Web site Clam AntiVirus Source: CCN Type: OSVDB ID: 16908 Clam AntiVirus on Mac OS X Crafted Filename Privilege Escalation Source: CCN Type: BID-13795 Clam Anti-Virus ClamAV Mac OS X Command Execution Vulnerability Source: MISC Type: Exploit, Vendor Advisory http://www.sentinelchicken.com/advisories/clamav Source: CCN Type: Sentinel Chicken Networks Security Advisory #04 ClamAV: Local Privilege Escalation Vulnerability On MacOS Source: XF Type: UNKNOWN clam-antivirus-filecopy-gain-privileges(20790) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
BACK |