Description
Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, allows remote attackers to cause a denial of service (scanning service crash) and execute arbitrary code via a crafted Portable Executable (PE) file that leads to a heap-based buffer overflow when less memory is allocated than expected.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Damian Put · textdosmultiple
https://www.exploit-db.com/exploits/2587
References (25)
Core 25
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/29607
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23155
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/4750
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/4034
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/22488
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/22370
US Government Resource third-party-advisory
x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/180864
Vendor Advisory vendor-advisory
x_refsource_suse
http://www.novell.com/linux/security/advisories/2006_60_clamav.html
Vendor Advisory x_refsource_confirm
http://docs.info.apple.com/article.html?artnum=304829
Vendor Advisory vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDKSA-2006:184
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/22626
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/4136
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/22421
Patch, Vendor Advisory third-party-advisory
x_refsource_idefense
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=422
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/4264
Various Sources x_refsource_confirm
http://kolab.org/security/kolab-vendor-notice-13.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/20535
Mailing List vendor-advisory
x_refsource_apple
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200610-10.xml
US Government Resource third-party-advisory
x_refsource_cert
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1017068
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2006/dsa-1196
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/22551
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/22537
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/22498
Scores
EPSS
0.1662
EPSS Percentile
94.9%
Details
Status
published
Products (48)
clam_anti-virus/clamav
.
clam_anti-virus/clamav
0.15
clam_anti-virus/clamav
0.20
clam_anti-virus/clamav
0.21
clam_anti-virus/clamav
0.22
clam_anti-virus/clamav
0.23
clam_anti-virus/clamav
0.24
clam_anti-virus/clamav
0.51
clam_anti-virus/clamav
0.52
clam_anti-virus/clamav
0.53
... and 38 more
Published
Oct 16, 2006
Tracked Since
Feb 18, 2026