First published: Tue Sep 20 2005(Updated: )
Buffer overflow in libclamav/upx.c in Clam AntiVirus (ClamAV) before 0.87 allows remote attackers to execute arbitrary code via a crafted UPX packed executable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ClamAV | =0.70 | |
ClamAV | =0.71 | |
ClamAV | =0.72 | |
ClamAV | =0.73 | |
ClamAV | =0.74 | |
ClamAV | =0.75 | |
ClamAV | =0.75.1 | |
ClamAV | =0.80 | |
ClamAV | =0.81 | |
ClamAV | =0.82 | |
ClamAV | =0.83 | |
ClamAV | =0.84 | |
ClamAV | =0.85 | |
ClamAV | =0.85.1 | |
ClamAV | =0.86 | |
ClamAV | =0.86.1 | |
ClamAV | =0.86.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2920 has a high severity rating due to the potential for remote code execution.
To fix CVE-2005-2920, upgrade ClamAV to version 0.87 or later.
CVE-2005-2920 affects ClamAV versions prior to 0.87, including versions from 0.70 to 0.86.2.
Yes, CVE-2005-2920 can be exploited remotely through crafted UPX packed executables.
CVE-2005-2920 is a vulnerability in ClamAV that allows remote attackers to execute arbitrary code via a buffer overflow.