Vulnerability Name: | CVE-2006-1615 (CCN-25661) |
Assigned: | 2006-04-06 |
Published: | 2006-04-06 |
Updated: | 2017-07-20 |
Summary: | Multiple format string vulnerabilities in the logging code in Clam AntiVirus (ClamAV) before 0.88.1 might allow remote attackers to execute arbitrary code. Note: as of 20060410, it is unclear whether this is a vulnerability, as there is some evidence that the arguments are actually being sanitized properly.
|
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-134
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2006-1615
Source: CCN Type: Apple Security Update 2006-003 About Security Update 2006-003
Source: APPLE Type: UNKNOWN APPLE-SA-2006-05-11
Source: SUSE Type: Patch, Vendor Advisory SUSE-SA:2006:020
Source: CCN Type: SA19534 ClamAV Multiple Vulnerabilities
Source: SECUNIA Type: Patch, Vendor Advisory 19534
Source: SECUNIA Type: Patch, Vendor Advisory 19536
Source: SECUNIA Type: Patch, Vendor Advisory 19564
Source: SECUNIA Type: Vendor Advisory 19567
Source: SECUNIA Type: Patch, Vendor Advisory 19570
Source: SECUNIA Type: Patch, Vendor Advisory 19608
Source: CCN Type: SA20077 Mac OS X Security Update Fixes Multiple Vulnerabilities
Source: SECUNIA Type: Vendor Advisory 20077
Source: SECUNIA Type: Vendor Advisory 23719
Source: CCN Type: SourceForge.net: Files Clam AntiVirus - File Release Notes and Changelog - Release Name: 0.88.1
Source: CONFIRM Type: Patch http://sourceforge.net/project/shownotes.php?release_id=407078&group_id=86638
Source: CONFIRM Type: UNKNOWN http://up2date.astaro.com/2006/05/low_up2date_6202.html
Source: DEBIAN Type: Patch, Vendor Advisory DSA-1024
Source: DEBIAN Type: DSA-1024 clamav -- several vulnerabilities
Source: CCN Type: GLSA-200604-06 ClamAV: Multiple vulnerabilities
Source: GENTOO Type: Patch, Vendor Advisory GLSA-200604-06
Source: MANDRIVA Type: UNKNOWN MDKSA-2006:067
Source: OSVDB Type: UNKNOWN 24458
Source: CCN Type: OSVDB ID: 24458 Clam AntiVirus Logging Code Format String
Source: BID Type: Patch 17388
Source: CCN Type: BID-17388 Clam AntiVirus ClamAV Multiple Vulnerabilities
Source: BID Type: UNKNOWN 17951
Source: CCN Type: BID-17951 Apple Mac OS X Security Update 2006-003 Multiple Vulnerabilities
Source: TRUSTIX Type: UNKNOWN 2006-0020
Source: CERT Type: US Government Resource TA06-132A
Source: VUPEN Type: Vendor Advisory ADV-2006-1258
Source: VUPEN Type: Vendor Advisory ADV-2006-1779
Source: XF Type: UNKNOWN clamav-output-format-string(25661)
Source: XF Type: UNKNOWN clamav-output-format-string(25661)
Source: SUSE Type: SUSE-SA:2006:020 clamav various problems
|
Vulnerable Configuration: | Configuration 1: cpe:/a:clamav:clamav:0.01:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.02:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.03:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.3:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.05:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.8:rc3:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.10:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.12:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.13:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.14:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.14:pre:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.15:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.20:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.21:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.22:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.23:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.24:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.51:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.52:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.53:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.54:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.60:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.60p:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.65:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.66:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.67:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.67-1:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.68:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.68.1:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.70:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.70:rc:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.71:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.72:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.73:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.74:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.75:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.75.1:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.80:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.80:rc:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.80:rc1:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.80:rc2:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.80:rc3:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.80:rc4:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.81:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.81:rc1:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.82:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.83:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.84:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.84:rc1:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.84:rc2:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.85:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.85.1:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.86:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.86:rc1:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.86.1:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.86.2:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.87:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:0.87.1:*:*:*:*:*:*:*OR cpe:/a:clamav:clamav:*:*:*:*:*:*:*:* (Version <= 0.88) Denotes that component is vulnerable |
Oval Definitions |
|
BACK |