First published: Thu Apr 06 2006(Updated: )
Multiple format string vulnerabilities in the logging code in Clam AntiVirus (ClamAV) before 0.88.1 might allow remote attackers to execute arbitrary code. NOTE: as of 20060410, it is unclear whether this is a vulnerability, as there is some evidence that the arguments are actually being sanitized properly.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Clamav Clamav | =0.86.2 | |
Clamav Clamav | =0.02 | |
Clamav Clamav | =0.8-rc3 | |
Clamav Clamav | =0.15 | |
Clamav Clamav | =0.75.1 | |
Clamav Clamav | =0.65 | |
Clamav Clamav | =0.81 | |
Clamav Clamav | =0.86 | |
Clamav Clamav | =0.01 | |
Clamav Clamav | =0.85 | |
Clamav Clamav | =0.84 | |
Clamav Clamav | =0.3 | |
Clamav Clamav | =0.70-rc | |
Clamav Clamav | =0.86-rc1 | |
Clamav Clamav | =0.68.1 | |
Clamav Clamav | =0.03 | |
Clamav Clamav | =0.87.1 | |
Clamav Clamav | =0.74 | |
Clamav Clamav | =0.86.1 | |
Clamav Clamav | =0.71 | |
Clamav Clamav | =0.60p | |
Clamav Clamav | =0.80-rc | |
Clamav Clamav | =0.85.1 | |
Clamav Clamav | =0.13 | |
Clamav Clamav | =0.81-rc1 | |
Clamav Clamav | =0.10 | |
Clamav Clamav | =0.80-rc3 | |
Clamav Clamav | =0.12 | |
Clamav Clamav | =0.23 | |
Clamav Clamav | =0.84-rc1 | |
Clamav Clamav | =0.80-rc2 | |
Clamav Clamav | =0.80-rc1 | |
Clamav Clamav | =0.60 | |
Clamav Clamav | =0.83 | |
Clamav Clamav | =0.20 | |
Clamav Clamav | =0.80-rc4 | |
Clamav Clamav | =0.70 | |
Clamav Clamav | =0.14 | |
Clamav Clamav | =0.24 | |
Clamav Clamav | =0.66 | |
Clamav Clamav | =0.51 | |
Clamav Clamav | =0.52 | |
Clamav Clamav | =0.22 | |
Clamav Clamav | =0.72 | |
Clamav Clamav | =0.75 | |
Clamav Clamav | =0.05 | |
Clamav Clamav | =0.54 | |
Clamav Clamav | =0.80 | |
Clamav Clamav | =0.87 | |
Clamav Clamav | =0.21 | |
Clamav Clamav | =0.84-rc2 | |
Clamav Clamav | =0.67-1 | |
Clamav Clamav | =0.14-pre | |
Clamav Clamav | =0.67 | |
Clamav Clamav | =0.68 | |
Clamav Clamav | =0.53 | |
Clamav Clamav | <=0.88 | |
Clamav Clamav | =0.82 | |
Clamav Clamav | =0.73 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.