First published: Tue Dec 12 2006(Updated: )
Multiple buffer overflows in Sophos Anti-Virus scanning engine before 2.40 allow remote attackers to execute arbitrary code via (1) a SIT archive with a long filename that is not null-terminated, which triggers a heap-based overflow in veex.dll due to improper length calculation, and (2) a CPIO archive, with a long filename that is not null-terminated, which triggers a stack-based overflow in veex.dll.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sophos Anti-Virus | <=2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6335 is considered to have a high severity due to the potential for remote code execution.
To fix CVE-2006-6335, update Sophos Anti-Virus to version 2.40 or later.
CVE-2006-6335 can be exploited by remote attackers sending specially crafted SIT or CPIO archives.
CVE-2006-6335 affects all versions of Sophos Anti-Virus prior to 2.40.
Users of affected versions of Sophos Anti-Virus are at risk of having their systems compromised or data exfiltrated.