CVE-2007-4560
ClamAV <0.91.2 - RCE
Title source: llmDescription
clamav-milter in ClamAV before 0.91.2, when run in black hole mode, allows remote attackers to execute arbitrary commands via shell metacharacters that are used in a certain popen call, involving the "recipient field of sendmail."
Exploits (6)
nomisec
WORKING POC
3 stars
by strikoder · poc
https://github.com/strikoder/sendmail-clamav-exploit-CVE-2007-4560
nomisec
WORKING POC
by 0x1sac · poc
https://github.com/0x1sac/ClamAV-Milter-Sendmail-0.91.2-Remote-Code-Execution
metasploit
WORKING POC
EXCELLENT
by aushack · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/smtp/clamav_milter_blackhole.rb
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/16924
exploitdb
WORKING POC
VERIFIED
by eliteboy · perlremotemultiple
https://www.exploit-db.com/exploits/4761
exploitdb
WORKING POC
VERIFIED
by patrick · rubyremotemultiple
https://www.exploit-db.com/exploits/9913
References (21)
... and 1 more
Scores
EPSS
0.8551
EPSS Percentile
99.4%
Classification
CWE
CWE-78
Status
draft
Affected Products (1)
clam_anti-virus/clamav
< 0.91.1
Timeline
Published
Aug 28, 2007
Tracked Since
Feb 18, 2026