CVE-2006-4182 (CNNVD-200610-216)
HIGH
有利用代码
中文标题:
Clam Anti-Virus PE文件头处理堆溢出漏洞
英文标题:
Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, allows remote attack...
CVSS分数:
7.5
发布时间:
2006-10-16 23:00:00
漏洞类型:
授权问题
状态:
PUBLISHED
数据质量分数:
0.40
数据版本:
v4
漏洞描述
中文描述:
Clam AntiVirus是Unix的GPL杀毒工具包,很多邮件网关产品都在使用。 Clam AV在处理畸形PE文件时存在堆溢出漏洞,远程攻击者可能利用此漏洞在服务器上执行任意指令 。 在处理某些PE格式文件时,两个变量可能会被恶意地设置为非常大的值,导致整数溢出。这可能导致分配比预期少的内存,之后的代码可能会覆盖堆缓冲区。
英文描述:
Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, allows remote attackers to cause a denial of service (scanning service crash) and execute arbitrary code via a crafted Portable Executable (PE) file that leads to a heap-based buffer overflow when less memory is allocated than expected.
CWE类型:
(暂无数据)
标签:
dos
multiple
Damian Put
OSVDB-29773
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| clam_anti-virus | clamav | * | - | - |
cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | . | - | - |
cpe:2.3:a:clam_anti-virus:clamav:.:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.15 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.15:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.20 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.20:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.21 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.21:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.22 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.22:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.23 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.23:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.24 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.24:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.51 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.51:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.52 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.52:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.53 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.53:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.54 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.54:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.60 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.60:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.60p | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.60p:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.65 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.65:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.67 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.67:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.68 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.68:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.68.1 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.68.1:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.70 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.70:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.71 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.71:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.72 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.72:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.73 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.73:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.74 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.74:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.75 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.75:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.75.1 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.75.1:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.80 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.80:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.80_rc1 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc1:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.80_rc2 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc2:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.80_rc3 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc3:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.80_rc4 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.80_rc4:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.81 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.81:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.81_rc1 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.81_rc1:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.82 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.82:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.83 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.83:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.84 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.84:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.84_rc1 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.84_rc1:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.84_rc2 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.84_rc2:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.85 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.85:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.85.1 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.85.1:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.86 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.86:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.86.1 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.86.1:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.86.2 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.86.2:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.86_rc1 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.86_rc1:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.87 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.87:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.87.1 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.87.1:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.88 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.88:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.88.1 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.88.1:*:*:*:*:*:*:*
|
| clam_anti-virus | clamav | 0.88.3 | - | - |
cpe:2.3:a:clam_anti-virus:clamav:0.88.3:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
ADV-2006-4750
vdb-entry
cve.org
访问
cve.org
ADV-2006-4034
vdb-entry
cve.org
访问
cve.org
22488
third-party-advisory
cve.org
访问
cve.org
22370
third-party-advisory
cve.org
访问
cve.org
VU#180864
third-party-advisory
cve.org
访问
cve.org
SUSE-SA:2006:060
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
MDKSA-2006:184
vendor-advisory
cve.org
访问
cve.org
22626
third-party-advisory
cve.org
访问
cve.org
ADV-2006-4136
vdb-entry
cve.org
访问
cve.org
22421
third-party-advisory
cve.org
访问
cve.org
20061016 Clam AntiVirus ClamAV rebuildpe Heap Overflow Vulnerability
third-party-advisory
cve.org
访问
cve.org
ADV-2006-4264
vdb-entry
cve.org
访问
cve.org
23155
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
20535
vdb-entry
cve.org
访问
cve.org
APPLE-SA-2006-11-28
vendor-advisory
cve.org
访问
cve.org
GLSA-200610-10
vendor-advisory
cve.org
访问
cve.org
TA06-333A
third-party-advisory
cve.org
访问
cve.org
1017068
vdb-entry
cve.org
访问
cve.org
DSA-1196
vendor-advisory
cve.org
访问
cve.org
clamav-rebuildpe-bo(29607)
vdb-entry
cve.org
访问
cve.org
22551
third-party-advisory
cve.org
访问
cve.org
22537
third-party-advisory
cve.org
访问
cve.org
22498
third-party-advisory
cve.org
访问
cve.org
ExploitDB EDB-2587
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-2587
EXPLOIT
exploitdb
访问
exploitdb
CVE Reference: CVE-2006-4182
ADVISORY
cve.org
访问
cve.org
CVSS评分详情
7.5
HIGH
CVSS向量:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本:
2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2006-10-16 23:00:00
修改时间:
2024-08-07 18:57:46
创建时间:
2025-11-11 15:32:36
更新时间:
2026-01-19 09:42:05
利用信息
此漏洞有可利用代码!
利用代码数量:
1
利用来源:
未知
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2006-4182 |
2025-11-11 15:17:44 | 2025-11-11 07:32:36 |
| NVD | nvd_CVE-2006-4182 |
2025-11-11 14:51:51 | 2025-11-11 07:41:21 |
| CNNVD | cnnvd_CNNVD-200610-216 |
2025-11-11 15:08:53 | 2025-11-11 07:49:11 |
| EXPLOITDB | exploitdb_EDB-2587 |
2025-11-11 15:05:27 | 2025-11-11 08:22:18 |
版本与语言
当前版本:
v4
主要语言:
EN
支持语言:
EN
ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4
EXPLOITDB
2025-11-11 16:22:18
references_count: 25 → 28; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- references_count: 25 -> 28
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3
CNNVD
2025-11-11 15:49:11
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200610-216; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200610-216
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:21
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 48; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 48
- data_sources: ['cve'] -> ['cve', 'nvd']