First published: Tue Aug 08 2006(Updated: )
Heap-based buffer overflow in the pefromupx function in libclamav/upx.c in Clam AntiVirus (ClamAV) 0.81 through 0.88.3 allows remote attackers to execute arbitrary code via a crafted UPX packed file containing sections with large rsize values.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ClamAV | =0.86.2 | |
ClamAV | =0.81 | |
ClamAV | =0.86 | |
ClamAV | =0.85 | |
ClamAV | =0.84 | |
ClamAV | =0.86-rc1 | |
ClamAV | =0.87.1 | |
ClamAV | =0.88 | |
ClamAV | =0.86.1 | |
ClamAV | =0.88.1 | |
ClamAV | =0.85.1 | |
ClamAV | =0.81-rc1 | |
ClamAV | =0.84-rc1 | |
ClamAV | =0.88.2 | |
ClamAV | =0.83 | |
ClamAV | =0.87 | |
ClamAV | =0.84-rc2 | |
ClamAV | =0.88.3 | |
ClamAV | =0.82 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4018 is considered a critical vulnerability due to its potential to allow remote code execution.
To mitigate CVE-2006-4018, upgrade ClamAV to version 0.88.4 or later.
CVE-2006-4018 affects Clam AntiVirus versions from 0.81 through 0.88.3.
CVE-2006-4018 is a heap-based buffer overflow vulnerability.
Attackers can execute arbitrary code on the affected system by exploiting CVE-2006-4018.