First published: Mon Oct 16 2006(Updated: )
Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, allows remote attackers to cause a denial of service (scanning service crash) and execute arbitrary code via a crafted Portable Executable (PE) file that leads to a heap-based buffer overflow when less memory is allocated than expected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ClamAV | =0.24 | |
ClamAV | =0.20 | |
ClamAV | =0.84 | |
ClamAV | =0.80 | |
ClamAV | =0.84_rc1 | |
ClamAV | =0.15 | |
ClamAV | =0.80_rc3 | |
ClamAV | <=0.88.4 | |
ClamAV | =0.80_rc4 | |
ClamAV | =0.65 | |
ClamAV | =0.75 | |
ClamAV | =0.68 | |
ClamAV | =0.71 | |
ClamAV | =0.88.3 | |
ClamAV | =0.86.1 | |
ClamAV | =0.82 | |
ClamAV | =0.88.1 | |
ClamAV | =0.73 | |
ClamAV | =0.72 | |
ClamAV | =0.85.1 | |
ClamAV | =. | |
ClamAV | =0.87 | |
ClamAV | =0.86_rc1 | |
ClamAV | =0.85 | |
ClamAV | =0.80_rc1 | |
ClamAV | =0.74 | |
ClamAV | =0.75.1 | |
ClamAV | =0.86.2 | |
ClamAV | =0.67 | |
ClamAV | =0.81 | |
ClamAV | =0.21 | |
ClamAV | =0.81_rc1 | |
ClamAV | =0.54 | |
ClamAV | =0.53 | |
ClamAV | =0.70 | |
ClamAV | =0.60p | |
ClamAV | =0.80_rc2 | |
ClamAV | =0.60 | |
ClamAV | =0.86 | |
ClamAV | =0.83 | |
ClamAV | =0.68.1 | |
ClamAV | =0.88 | |
ClamAV | =0.87.1 | |
ClamAV | =0.84_rc2 | |
ClamAV | =0.51 | |
ClamAV | =0.23 | |
ClamAV | =0.52 | |
ClamAV | =0.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-4182 is high due to its potential for causing denial of service and remote code execution.
To fix CVE-2006-4182, update ClamAV to version 0.88.5 or later.
CVE-2006-4182 affects multiple versions of ClamAV prior to 0.88.5, including versions as low as 0.15.
The impact of CVE-2006-4182 includes crashes of the scanning service and the possibility of remote code execution.
CVE-2006-4182 exploits an integer overflow leading to a heap-based buffer overflow when parsing crafted PE files.