ID SECURITYVULNS:VULN:6591
Type securityvulns
Reporter BUGTRAQ
Modified 2006-09-08T00:00:00
Description
Buffer overflow on LHA archives parsing.
{"id": "SECURITYVULNS:VULN:6591", "bulletinFamily": "software", "title": "Alvila Avast! antivirus buffer overflow", "description": "Buffer overflow on LHA archives parsing.", "published": "2006-09-08T00:00:00", "modified": "2006-09-08T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:6591", "reporter": "BUGTRAQ", "references": ["https://vulners.com/securityvulns/securityvulns:doc:14190"], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:09:21", "edition": 1, "viewCount": 5, "enchantments": {"score": {"value": 5.7, "vector": "NONE", "modified": "2018-08-31T11:09:21", "rev": 2}, "dependencies": {"references": [{"type": "mskb", "idList": ["KB2787763", "KB2603287", "KB2600640", "KB2510690", "KB977074"]}, {"type": "centos", "idList": ["CESA-2020:1011"]}, {"type": "threatpost", "idList": ["THREATPOST:2FC50917F19F5A13F14EBE274E190CD9", "THREATPOST:F3563336B135A1D7C1251AE54FDC6286"]}, {"type": "oraclelinux", "idList": ["ELSA-2020-1011"]}, {"type": "nessus", "idList": ["DEBIAN_DLA-2164.NASL", "REDHAT-RHSA-2020-1011.NASL", "FREEBSD_PKG_40194E1C6D8911EA808280EE73419AF3.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310892164"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2164-1:52F3C"]}, {"type": "redhat", "idList": ["RHSA-2020:1011"]}, {"type": "zdt", "idList": ["1337DAY-ID-34168", "1337DAY-ID-34156", "1337DAY-ID-34161"]}, {"type": "carbonblack", "idList": ["CARBONBLACK:0C01AD7DF1850D0059FF0CAF629FC366"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:10149"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:14190"]}], "modified": "2018-08-31T11:09:21", "rev": 2}, "vulnersScore": 5.7}, "affectedSoftware": []}
{"rst": [{"lastseen": "2021-02-26T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **221[.]6.198.254** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **20**.\n First seen: 2020-04-04T03:00:00, Last seen: 2021-02-26T03:00:00.\n IOC tags: **generic**.\nASN 4837: (First IP 221.6.83.131, Last IP 221.8.12.255).\nASN Name \"CHINA169BACKBONE\" and Organisation \"CNCGROUP China169 Backbone\".\nASN hosts 562029 domains.\nGEO IP information: City \"Dezhou\", Country \"China\".\nIOC could be a **False Positive** (May be a Cloud provider IP).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-04-04T00:00:00", "id": "RST:096C060E-6591-3A4C-8159-55943D6EF6AA", "href": "", "published": "2021-02-27T00:00:00", "title": "RST Threat feed. IOC: 221.6.198.254", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-27T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **http://limpiasam[.]cl/-/chase/firstlog.php?public/enroll/identifyuser-aspx-lob=rbglogon=mtg0mji1ndmzmtg0mji1ndmz&session=mtg0mji1ndmzmtg0mji1ndmz** in [RST Threat Feed](https://rstcloud.net/profeed) with score **17**.\n First seen: 2021-02-27T03:00:00, Last seen: 2021-02-27T03:00:00.\n IOC tags: **phishing**.\nIOC could be a **False Positive** (Resource unavailable).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-27T00:00:00", "id": "RST:FC4E5FED-6591-301A-A711-6A046E2AFE2B", "href": "", "published": "2021-02-27T00:00:00", "title": "RST Threat feed. IOC: http://limpiasam.cl/-/chase/firstlog.php?public/enroll/identifyuser-aspx-lob=rbglogon=mtg0mji1ndmzmtg0mji1ndmz&session=mtg0mji1ndmzmtg0mji1ndmz", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-26T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **182[.]253.251.83** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **13**.\n First seen: 2020-12-25T03:00:00, Last seen: 2021-02-26T03:00:00.\n IOC tags: **generic**.\nASN 17451: (First IP 182.253.223.0, Last IP 182.253.255.255).\nASN Name \"BIZNETASAP\" and Organisation \"BIZNET NETWORKS\".\nASN hosts 1665 domains.\nGEO IP information: City \"Jakarta\", Country \"Indonesia\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-25T00:00:00", "id": "RST:F1427F58-6591-3C9B-A2E4-F4F2F1D60AC3", "href": "", "published": "2021-02-27T00:00:00", "title": "RST Threat feed. IOC: 182.253.251.83", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-26T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **96[.]79.125.33** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **13**.\n First seen: 2020-12-22T03:00:00, Last seen: 2021-02-26T03:00:00.\n IOC tags: **generic**.\nASN 7922: (First IP 96.64.0.0, Last IP 96.108.43.255).\nASN Name \"COMCAST7922\" and Organisation \"Comcast Cable Communications LLC\".\nASN hosts 159727 domains.\nGEO IP information: City \"Portland\", Country \"United States\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-22T00:00:00", "id": "RST:F9DBD920-6591-3A45-9EE1-F664A8B9BFB8", "href": "", "published": "2021-02-27T00:00:00", "title": "RST Threat feed. IOC: 96.79.125.33", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-26T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **cdek[.]delyshop.ru** in [RST Threat Feed](https://rstcloud.net/profeed) with score **9**.\n First seen: 2020-08-23T03:00:00, Last seen: 2021-02-26T03:00:00.\n IOC tags: **phishing**.\nDomain has DNS A records: 192[.]5.6.30\nWhois:\n Created: 2020-08-22 18:19:50, \n Registrar: REGRURU, \n Registrant: Private Person.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-08-23T00:00:00", "id": "RST:24CF30D5-6591-3107-A2BF-A777EA7ECD4F", "href": "", "published": "2021-02-27T00:00:00", "title": "RST Threat feed. IOC: cdek.delyshop.ru", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **179[.]4.138.48** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **9**.\n First seen: 2020-10-04T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **generic**.\nASN 6535: (First IP 179.4.0.0, Last IP 179.4.255.255).\nASN Name \"\" and Organisation \"Telmex Servicios Empresariales SA\".\nASN hosts 128 domains.\nGEO IP information: City \"Iquique\", Country \"Chile\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-10-04T00:00:00", "id": "RST:74916590-6591-3ED9-A95B-FBAA836E40EA", "href": "", "published": "2021-02-26T00:00:00", "title": "RST Threat feed. IOC: 179.4.138.48", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-24T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **luckyspinpubg[.]net** in [RST Threat Feed](https://rstcloud.net/profeed) with score **56**.\n First seen: 2021-02-24T03:00:00, Last seen: 2021-02-24T03:00:00.\n IOC tags: **phishing**.\nDomain has DNS A records: 104[.]21.72.184,172.67.153.218\nWhois:\n Created: 2021-02-20 06:16:07, \n Registrar: Wild West Domains LLC, \n Registrant: Not Available From Registry.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-24T00:00:00", "id": "RST:C0A98A83-6591-331D-ADC7-70ED1DDF933C", "href": "", "published": "2021-02-25T00:00:00", "title": "RST Threat feed. IOC: luckyspinpubg.net", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 us2.eclipsemc.com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **20**.\n First seen: 2021-02-23T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **cryptomining**.\nWhois:\n Created: 2011-05-14 05:16:02, \n Registrar: ENOM INC, \n Registrant: Whois Agent.\nIOC could be a **False Positive** (Domain not resolved, but Whois records found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-23T00:00:00", "id": "RST:1C44F3B8-6591-3424-8D12-D3D77DED23A9", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 us2.eclipsemc.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-14T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **c-68-53-73-88[.]hsd1.tn.comcast.net** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2020-12-22T03:00:00, Last seen: 2021-02-14T03:00:00.\n IOC tags: **generic**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-22T00:00:00", "id": "RST:CAE46F22-6591-37EB-BA99-C0CD75184E86", "href": "", "published": "2021-02-15T00:00:00", "title": "RST Threat feed. IOC: c-68-53-73-88.hsd1.tn.comcast.net", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-14T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **acmt5drizt[.]neliver.com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2020-12-22T03:00:00, Last seen: 2021-02-14T03:00:00.\n IOC tags: **generic**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-22T00:00:00", "id": "RST:9992D891-6591-3827-A5CA-EB0907A2E945", "href": "", "published": "2021-02-15T00:00:00", "title": "RST Threat feed. IOC: acmt5drizt.neliver.com", "type": "rst", "cvss": {}}]}