CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
93.1%
Off-by-one error in the get_unicode_name function (libclamav/vba_extract.c) in Clam Anti-Virus (ClamAV) before 0.94.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted VBA project file, which triggers a heap-based buffer overflow.
Vendor | Product | Version | CPE |
---|---|---|---|
clam_anti-virus | clamav | * | cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* |
clam_anti-virus | clamav | 0.01 | cpe:2.3:a:clam_anti-virus:clamav:0.01:*:*:*:*:*:*:* |
clam_anti-virus | clamav | 0.02 | cpe:2.3:a:clam_anti-virus:clamav:0.02:*:*:*:*:*:*:* |
clam_anti-virus | clamav | 0.03 | cpe:2.3:a:clam_anti-virus:clamav:0.03:*:*:*:*:*:*:* |
clam_anti-virus | clamav | 0.04 | cpe:2.3:a:clam_anti-virus:clamav:0.04:*:*:*:*:*:*:* |
clam_anti-virus | clamav | 0.05 | cpe:2.3:a:clam_anti-virus:clamav:0.05:*:*:*:*:*:*:* |
clam_anti-virus | clamav | 0.06 | cpe:2.3:a:clam_anti-virus:clamav:0.06:*:*:*:*:*:*:* |
clam_anti-virus | clamav | 0.10 | cpe:2.3:a:clam_anti-virus:clamav:0.10:*:*:*:*:*:*:* |
clam_anti-virus | clamav | 0.11 | cpe:2.3:a:clam_anti-virus:clamav:0.11:*:*:*:*:*:*:* |
clam_anti-virus | clamav | 0.12 | cpe:2.3:a:clam_anti-virus:clamav:0.12:*:*:*:*:*:*:* |
lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
lists.grok.org.uk/pipermail/full-disclosure/2008-November/065530.html
lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
secunia.com/advisories/32663
secunia.com/advisories/32699
secunia.com/advisories/32765
secunia.com/advisories/32872
secunia.com/advisories/33016
secunia.com/advisories/33317
secunia.com/advisories/33937
security.gentoo.org/glsa/glsa-200812-21.xml
securityreason.com/securityalert/4579
sourceforge.net/project/shownotes.php?release_id=637952&group_id=86638
support.apple.com/kb/HT3438
www.debian.org/security/2008/dsa-1680
www.mandriva.com/security/advisories?name=MDVSA-2008:229
www.securityfocus.com/archive/1/498169/100/0/threaded
www.securityfocus.com/bid/32207
www.securitytracker.com/id?1021159
www.ubuntu.com/usn/usn-672-1
www.vupen.com/english/advisories/2008/3085
www.vupen.com/english/advisories/2009/0422
exchange.xforce.ibmcloud.com/vulnerabilities/46462
www.redhat.com/archives/fedora-package-announce/2008-November/msg00332.html
www.redhat.com/archives/fedora-package-announce/2008-November/msg00348.html