Vulnerability Name:

CVE-2006-6293 (CCN-30709)

Assigned:2006-11-24
Published:2006-11-24
Updated:2018-10-17
Summary:Heap-based buffer overflow in FRISK Software F-Prot Antivirus before 4.6.7 allows user-assisted remote attackers to execute arbitrary code via a crafted CHM file.
Note: this issue has at least a partial overlap with CVE-2006-6294.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.8 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Full-Disclosure Mailing List, Mon Dec 04 2006 - 07:48:59 CST
F-Prot Antivirus for Unix: heap overflow and Denial of Service

Source: MITRE
Type: CNA
CVE-2006-6293

Source: MISC
Type: UNKNOWN
http://gleg.net/fprot.txt

Source: MISC
Type: Exploit
http://gleg.net/vulndisco_meta.shtml

Source: FULLDISC
Type: UNKNOWN
20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service

Source: CCN
Type: SA22879
F-PROT Antivirus ACE and CHM File Handling Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
22879

Source: SECUNIA
Type: Vendor Advisory
23328

Source: GENTOO
Type: UNKNOWN
GLSA-200612-12

Source: CCN
Type: SECTRACK ID: 1017331
F-Prot Antivirus CHM File Buffer Overflow and ACE Archive Infinite Loop Lets Remote Users Execute Arbitrary Code and Deny Service

Source: SECTRACK
Type: UNKNOWN
1017331

Source: CCN
Type: F-Prot Antivirus Web site
New versions of F-Prot Antivirus - F-Prot Antivirus News

Source: CONFIRM
Type: UNKNOWN
http://www.f-prot.com/news/gen_news/061201_release_unix467.html

Source: CCN
Type: GLSA-200612-12
F-PROT Antivirus: Multiple vulnerabilities

Source: OSVDB
Type: UNKNOWN
30406

Source: CCN
Type: OSVDB ID: 30406
Frisk F-PROT Antivirus Unspecified CHM File Overflow

Source: CCN
Type: OSVDB ID: 31300
Frisk F-PROT Antivirus Unspecified Issue

Source: BUGTRAQ
Type: UNKNOWN
20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service

Source: BID
Type: Patch, Vendor Advisory
21086

Source: CCN
Type: BID-21086
F-PROT Antivirus CHM File Heap Buffer Overflow Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2006-4830

Source: XF
Type: UNKNOWN
fprot-chm-bo(30709)

Source: EXPLOIT-DB
Type: UNKNOWN
2893

Vulnerable Configuration:Configuration 1:
  • cpe:/a:f-prot:f-prot_antivirus:3.11b:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.12:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.12a:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.12b:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.12c:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.12d:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.13:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.13a:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.14:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.14a:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.14b:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.14c:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.14d:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.14e:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.15:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.15a:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.15b:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.16:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.16a:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.16b:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.16c:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.16d:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.16e:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:3.16f:*:*:*:*:*:*:*
  • OR cpe:/a:f-prot:f-prot_antivirus:*:*:*:*:*:*:*:* (Version <= 4.6.6)

  • Configuration CCN 1:
  • cpe:/a:f-prot:f-prot_antivirus:4.6.6:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    f-prot f-prot antivirus 3.11b
    f-prot f-prot antivirus 3.12
    f-prot f-prot antivirus 3.12a
    f-prot f-prot antivirus 3.12b
    f-prot f-prot antivirus 3.12c
    f-prot f-prot antivirus 3.12d
    f-prot f-prot antivirus 3.13
    f-prot f-prot antivirus 3.13a
    f-prot f-prot antivirus 3.14
    f-prot f-prot antivirus 3.14a
    f-prot f-prot antivirus 3.14b
    f-prot f-prot antivirus 3.14c
    f-prot f-prot antivirus 3.14d
    f-prot f-prot antivirus 3.14e
    f-prot f-prot antivirus 3.15
    f-prot f-prot antivirus 3.15a
    f-prot f-prot antivirus 3.15b
    f-prot f-prot antivirus 3.16
    f-prot f-prot antivirus 3.16a
    f-prot f-prot antivirus 3.16b
    f-prot f-prot antivirus 3.16c
    f-prot f-prot antivirus 3.16d
    f-prot f-prot antivirus 3.16e
    f-prot f-prot antivirus 3.16f
    f-prot f-prot antivirus *
    f-prot f-prot antivirus 4.6.6
    gentoo linux *