First published: Wed Aug 03 2005(Updated: )
Multiple integer overflows in the (1) TNEF, (2) CHM, or (3) FSG file format processors in libclamav for Clam AntiVirus (ClamAV) 0.86.1 and earlier allow remote attackers to gain privileges via a crafted e-mail message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ClamAV | =0.85 | |
ClamAV | =0.85.1 | |
ClamAV | =0.86 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2450 has a high severity rating due to the potential for remote code execution and privilege escalation.
To fix CVE-2005-2450, update ClamAV to version 0.86.1 or later, which addresses the identified vulnerabilities.
CVE-2005-2450 affects ClamAV versions 0.85, 0.85.1, and 0.86.
Yes, CVE-2005-2450 can be exploited remotely through specially crafted email messages.
CVE-2005-2450 is categorized as an integer overflow vulnerability, which can lead to memory corruption.