First published: Thu Aug 06 2009(Updated: )
Multiple unspecified vulnerabilities in Sophos SAVScan 4.33.0 for Linux, and possibly other products and versions, allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via crafted files that have been packed with (1) armadillo, (2) asprotect, or (3) asprotectSKE.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sophos Anti-Virus for Sophos Central macOS | =4.7.18 | |
Sophos Anti-Virus for Sophos Central macOS | =4.7.18 | |
Sophos Anti-Virus for Sophos Central macOS | =4.9.18 | |
Sophos Anti-Virus for Sophos Central macOS | =4.37.0 | |
Sophos Anti-Virus for Sophos Central macOS | =6.4.5 | |
Sophos Anti-Virus for Sophos Central macOS | =7.0.5 | |
Sophos Anti-Virus 7.6.3 | =windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6904 can lead to denial of service conditions and the potential execution of arbitrary code via specially crafted files.
CVE-2008-6904 impacts multiple versions of Sophos Anti-Virus, including versions 4.7.18, 4.9.18, 4.37.0, 6.4.5, and 7.0.5.
To mitigate CVE-2008-6904, ensure you update to the latest version of Sophos Anti-Virus that addresses this vulnerability.
CVE-2008-6904 may allow remote attackers to execute arbitrary code through crafted files.
System administrators should review their Sophos Anti-Virus deployments for the vulnerability outlined in CVE-2008-6904 and apply necessary updates to prevent exploitation.