First published: Tue Jan 10 2006(Updated: )
Heap-based buffer overflow in libclamav/upx.c in Clam Antivirus (ClamAV) before 0.88 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted UPX files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ClamAV | =0.84 | |
ClamAV | =0.80 | |
ClamAV | =0.84_rc1 | |
ClamAV | =0.80_rc3 | |
ClamAV | =0.80_rc4 | |
ClamAV | =0.65 | |
ClamAV | =0.68 | |
ClamAV | =0.86.1 | |
ClamAV | =0.82 | |
ClamAV | =0.85.1 | |
ClamAV | =. | |
ClamAV | =0.87 | |
ClamAV | =0.85 | |
ClamAV | =0.80_rc1 | |
ClamAV | =0.75.1 | |
ClamAV | =0.86.2 | |
ClamAV | =0.67 | |
ClamAV | =0.81 | |
ClamAV | =0.54 | |
ClamAV | =0.53 | |
ClamAV | =0.70 | |
ClamAV | =0.80_rc2 | |
ClamAV | =0.60 | |
ClamAV | =0.86 | |
ClamAV | =0.83 | |
ClamAV | =0.68.1 | |
ClamAV | =0.87.1 | |
ClamAV | =0.84_rc2 | |
ClamAV | =0.51 | |
ClamAV | =0.52 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0162 has a high severity rating due to its potential to cause denial of service and execute arbitrary code.
To fix CVE-2006-0162, you should upgrade ClamAV to version 0.88 or later.
CVE-2006-0162 can lead to crashes and exploitation of user systems through specially crafted UPX files.
CVE-2006-0162 affects multiple versions of ClamAV including 0.80, 0.84, and many earlier releases.
Currently, the only effective workaround for CVE-2006-0162 is to upgrade to a patched version of ClamAV.