First published: Thu Aug 06 2009(Updated: )
Sophos Anti-Virus for Windows before 7.6.3, Anti-Virus for Windows NT/9x before 4.7.18, Anti-Virus for OS X before 4.9.18, Anti-Virus for Linux before 6.4.5, Anti-Virus for UNIX before 7.0.5, Anti-Virus for Unix and Netware before 4.37.0, Sophos EM Library, and Sophos small business solutions, when CAB archive scanning is enabled, allows remote attackers to cause a denial of service (segmentation fault) via a "fuzzed" CAB archive file, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sophos Anti-Virus | =4.7.18 | |
Sophos Anti-Virus | =4.7.18 | |
Sophos Anti-Virus | =4.9.18 | |
Sophos Anti-Virus | =4.37.0 | |
Sophos Anti-Virus | =6.4.5 | |
Sophos Anti-Virus | =7.0.5 | |
Sophos Anti-Virus 7.6.3 | =windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6903 is considered a high severity vulnerability due to its potential impact on multiple versions of Sophos Anti-Virus software.
CVE-2008-6903 affects Sophos Anti-Virus versions prior to 7.6.3 for Windows, 4.7.18 for Windows NT/9x, 4.9.18 for OS X, 6.4.5 for Linux, 7.0.5 for UNIX, and 4.37.0 for Netware.
To fix CVE-2008-6903, upgrade your Sophos Anti-Virus software to the latest patched version.
Remediation for CVE-2008-6903 includes updating vulnerable Sophos Anti-Virus installations and implementing additional security measures such as firewalls and intrusion detection systems.
The risks associated with CVE-2008-6903 include unauthorized access, data breaches, and exploitation of the affected systems.