First published: Sun Feb 06 2005(Updated: )
ClamAV 0.80 and earlier allows remote attackers to cause a denial of service (clamd daemon crash) via a ZIP file with malformed headers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ClamXAV | =0.80 | |
ClamXAV | =0.65 | |
ClamXAV | =0.68 | |
ClamXAV | =0.67 | |
ClamXAV | =0.54 | |
ClamXAV | =0.53 | |
ClamXAV | =0.60 | |
ClamXAV | =0.68.1 | |
ClamXAV | =0.51 | |
ClamXAV | =0.52 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0133 has a high severity rating as it allows remote attackers to crash the clamd daemon, resulting in a denial of service.
To fix CVE-2005-0133, it is recommended to upgrade to a version of ClamAV that is 0.81 or later.
CVE-2005-0133 affects ClamAV versions 0.80, 0.68.1, 0.68, 0.67, 0.65, 0.60, 0.54, 0.53, 0.52, and 0.51.
CVE-2005-0133 exploits vulnerabilities in the handling of malformed headers in ZIP files.
CVE-2005-0133 is a remote vulnerability that allows attackers to crash the ClamAV service over the network.