Vulnerability Name:
CVE-2006-6293 (CCN-30709)
Assigned:
2006-11-24
Published:
2006-11-24
Updated:
2018-10-17
Summary:
Heap-based buffer overflow in FRISK Software F-Prot Antivirus before 4.6.7 allows user-assisted remote attackers to execute arbitrary code via a crafted CHM file.
Note
: this issue has at least a partial overlap with
CVE-2006-6294
.
CVSS v3 Severity:
10.0 Critical
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
CVSS v2 Severity:
7.5 High
(CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
)
5.9 Medium
(Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
10.0 High
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
)
7.8 High
(CCN Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
Vulnerability Type:
CWE-119
Vulnerability Consequences:
Gain Access
References:
Source: CCN
Type: Full-Disclosure Mailing List, Mon Dec 04 2006 - 07:48:59 CST
F-Prot Antivirus for Unix: heap overflow and Denial of Service
Source: MITRE
Type: CNA
CVE-2006-6293
Source: MISC
Type: UNKNOWN
http://gleg.net/fprot.txt
Source: MISC
Type: Exploit
http://gleg.net/vulndisco_meta.shtml
Source: FULLDISC
Type: UNKNOWN
20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service
Source: CCN
Type: SA22879
F-PROT Antivirus ACE and CHM File Handling Vulnerabilities
Source: SECUNIA
Type: Vendor Advisory
22879
Source: SECUNIA
Type: Vendor Advisory
23328
Source: GENTOO
Type: UNKNOWN
GLSA-200612-12
Source: CCN
Type: SECTRACK ID: 1017331
F-Prot Antivirus CHM File Buffer Overflow and ACE Archive Infinite Loop Lets Remote Users Execute Arbitrary Code and Deny Service
Source: SECTRACK
Type: UNKNOWN
1017331
Source: CCN
Type: F-Prot Antivirus Web site
New versions of F-Prot Antivirus - F-Prot Antivirus News
Source: CONFIRM
Type: UNKNOWN
http://www.f-prot.com/news/gen_news/061201_release_unix467.html
Source: CCN
Type: GLSA-200612-12
F-PROT Antivirus: Multiple vulnerabilities
Source: OSVDB
Type: UNKNOWN
30406
Source: CCN
Type: OSVDB ID: 30406
Frisk F-PROT Antivirus Unspecified CHM File Overflow
Source: CCN
Type: OSVDB ID: 31300
Frisk F-PROT Antivirus Unspecified Issue
Source: BUGTRAQ
Type: UNKNOWN
20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service
Source: BID
Type: Patch, Vendor Advisory
21086
Source: CCN
Type: BID-21086
F-PROT Antivirus CHM File Heap Buffer Overflow Vulnerability
Source: VUPEN
Type: Vendor Advisory
ADV-2006-4830
Source: XF
Type: UNKNOWN
fprot-chm-bo(30709)
Source: EXPLOIT-DB
Type: UNKNOWN
2893
Vulnerable Configuration:
Configuration 1
:
cpe:/a:f-prot:f-prot_antivirus:3.11b:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.12:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.12a:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.12b:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.12c:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.12d:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.13:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.13a:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.14:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.14a:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.14b:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.14c:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.14d:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.14e:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.15:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.15a:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.15b:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.16:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.16a:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.16b:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.16c:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.16d:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.16e:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:3.16f:*:*:*:*:*:*:*
OR
cpe:/a:f-prot:f-prot_antivirus:*:*:*:*:*:*:*:*
(Version <= 4.6.6)
Configuration CCN 1
:
cpe:/a:f-prot:f-prot_antivirus:4.6.6:*:*:*:*:*:*:*
AND
cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
f-prot
f-prot antivirus 3.11b
f-prot
f-prot antivirus 3.12
f-prot
f-prot antivirus 3.12a
f-prot
f-prot antivirus 3.12b
f-prot
f-prot antivirus 3.12c
f-prot
f-prot antivirus 3.12d
f-prot
f-prot antivirus 3.13
f-prot
f-prot antivirus 3.13a
f-prot
f-prot antivirus 3.14
f-prot
f-prot antivirus 3.14a
f-prot
f-prot antivirus 3.14b
f-prot
f-prot antivirus 3.14c
f-prot
f-prot antivirus 3.14d
f-prot
f-prot antivirus 3.14e
f-prot
f-prot antivirus 3.15
f-prot
f-prot antivirus 3.15a
f-prot
f-prot antivirus 3.15b
f-prot
f-prot antivirus 3.16
f-prot
f-prot antivirus 3.16a
f-prot
f-prot antivirus 3.16b
f-prot
f-prot antivirus 3.16c
f-prot
f-prot antivirus 3.16d
f-prot
f-prot antivirus 3.16e
f-prot
f-prot antivirus 3.16f
f-prot
f-prot antivirus *
f-prot
f-prot antivirus 4.6.6
gentoo
linux *