First published: Wed Nov 01 2006(Updated: )
Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sophos Anti-virus | =4.04 | |
Sophos Anti-virus | =5.2 | |
Sophos Anti-virus | =5.0.2 | |
Sophos Anti-virus | =4.5.12 | |
Sophos Endpoint Security | <=6.04 | |
Sophos Anti-virus | =4.5.11 | |
Sophos Anti-virus | =4.7.1 | |
Sophos Anti-virus | =4.7.2 | |
Sophos Anti-virus | =5.0.4 | |
Sophos Anti-virus | =5.2.1 | |
Sophos Anti-virus | =4.05 | |
Sophos Anti-virus | =4.5.3 | |
Sophos Anti-virus | =4.5.4 | |
Sophos Anti-virus | =6.0.4 | |
Sophos Anti-virus | =5.1 | |
Sophos Anti-virus | =5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.