First published: Sat Nov 05 2005(Updated: )
The FSG unpacker (fsg.c) in Clam AntiVirus (ClamAV) 0.80 through 0.87 allows remote attackers to cause "memory corruption" and execute arbitrary code via a crafted FSG 1.33 file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ClamAV | =0.80 | |
ClamAV | =0.81 | |
ClamAV | =0.82 | |
ClamAV | =0.83 | |
ClamAV | =0.84 | |
ClamAV | =0.85 | |
ClamAV | =0.85.1 | |
ClamAV | =0.86 | |
ClamAV | =0.86.1 | |
ClamAV | =0.86.2 | |
ClamAV | =0.87 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3303 is considered a critical vulnerability due to the potential for remote code execution and memory corruption.
To fix CVE-2005-3303, you should upgrade ClamAV to version 0.88 or later, which addresses this vulnerability.
CVE-2005-3303 affects ClamAV versions 0.80 through 0.87.
Yes, CVE-2005-3303 can be exploited by remote attackers via crafted FSG 1.33 files.
CVE-2005-3303 facilitates memory corruption attacks, potentially allowing attackers to execute arbitrary code.