Vulnerability Name: | CVE-2005-2920 (CCN-22307) | ||||||||||||
Assigned: | 2005-09-19 | ||||||||||||
Published: | 2005-09-19 | ||||||||||||
Updated: | 2017-07-11 | ||||||||||||
Summary: | Buffer overflow in libclamav/upx.c in Clam AntiVirus (ClamAV) before 0.87 allows remote attackers to execute arbitrary code via a crafted UPX packed executable. | ||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2005-2920 Source: CCN Type: SA16848 ClamAV UPX and FSG Handling Vulnerabilities Source: SECUNIA Type: UNKNOWN 16848 Source: SECUNIA Type: UNKNOWN 16989 Source: CCN Type: SourceForge.net: Files Clam AntiVirus - File Release Notes and Changelog - Release Name: 0.87 Source: CONFIRM Type: Patch http://sourceforge.net/project/shownotes.php?release_id=356974 Source: CCN Type: ClamAV Download Web page clamav 0.86.1 released Source: DEBIAN Type: UNKNOWN DSA-824 Source: DEBIAN Type: DSA-824 clamav -- infinite loop Source: CCN Type: GLSA-200509-13 Clam AntiVirus: Multiple vulnerabilities Source: GENTOO Type: Patch, Vendor Advisory GLSA-200509-13 Source: CCN Type: US-CERT VU#363713 Clam AntiVirus contains a buffer overflow vulnerability Source: CERT-VN Type: US Government Resource VU#363713 Source: SUSE Type: UNKNOWN SUSE-SA:2005:055 Source: OSVDB Type: UNKNOWN 19506 Source: CCN Type: OSVDB ID: 19506 Clam AntiVirus libclamav/upx.c UPX Processing Overflow Source: BID Type: UNKNOWN 14866 Source: CCN Type: BID-14866 ClamAV UPX Compressed Executable Buffer Overflow Vulnerability Source: VUPEN Type: UNKNOWN ADV-2005-1774 Source: XF Type: UNKNOWN clam-antivirus-upx-bo(22307) Source: XF Type: UNKNOWN clam-antivirus-upx-bo(22307) Source: SUSE Type: SUSE-SA:2005:055 clamav: remote code execution | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |