CVE-2006-4182 (CNNVD-200610-216)

HIGH 有利用代码
中文标题:
Clam Anti-Virus PE文件头处理堆溢出漏洞
英文标题:
Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, allows remote attack...
CVSS分数: 7.5
发布时间: 2006-10-16 23:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v4
漏洞描述
中文描述:

Clam AntiVirus是Unix的GPL杀毒工具包,很多邮件网关产品都在使用。 Clam AV在处理畸形PE文件时存在堆溢出漏洞,远程攻击者可能利用此漏洞在服务器上执行任意指令 。 在处理某些PE格式文件时,两个变量可能会被恶意地设置为非常大的值,导致整数溢出。这可能导致分配比预期少的内存,之后的代码可能会覆盖堆缓冲区。

英文描述:

Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, allows remote attackers to cause a denial of service (scanning service crash) and execute arbitrary code via a crafted Portable Executable (PE) file that leads to a heap-based buffer overflow when less memory is allocated than expected.

CWE类型:
(暂无数据)
标签:
dos multiple Damian Put OSVDB-29773
受影响产品
厂商 产品 版本 版本范围 平台 CPE
clam_anti-virus clamav * - - cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*
clam_anti-virus clamav . - - cpe:2.3:a:clam_anti-virus:clamav:.:*:*:*:*:*:*:*
clam_anti-virus clamav 0.15 - - cpe:2.3:a:clam_anti-virus:clamav:0.15:*:*:*:*:*:*:*
clam_anti-virus clamav 0.20 - - cpe:2.3:a:clam_anti-virus:clamav:0.20:*:*:*:*:*:*:*
clam_anti-virus clamav 0.21 - - cpe:2.3:a:clam_anti-virus:clamav:0.21:*:*:*:*:*:*:*
clam_anti-virus clamav 0.22 - - cpe:2.3:a:clam_anti-virus:clamav:0.22:*:*:*:*:*:*:*
clam_anti-virus clamav 0.23 - - cpe:2.3:a:clam_anti-virus:clamav:0.23:*:*:*:*:*:*:*
clam_anti-virus clamav 0.24 - - cpe:2.3:a:clam_anti-virus:clamav:0.24:*:*:*:*:*:*:*
clam_anti-virus clamav 0.51 - - cpe:2.3:a:clam_anti-virus:clamav:0.51:*:*:*:*:*:*:*
clam_anti-virus clamav 0.52 - - cpe:2.3:a:clam_anti-virus:clamav:0.52:*:*:*:*:*:*:*
clam_anti-virus clamav 0.53 - - cpe:2.3:a:clam_anti-virus:clamav:0.53:*:*:*:*:*:*:*
clam_anti-virus clamav 0.54 - - cpe:2.3:a:clam_anti-virus:clamav:0.54:*:*:*:*:*:*:*
clam_anti-virus clamav 0.60 - - cpe:2.3:a:clam_anti-virus:clamav:0.60:*:*:*:*:*:*:*
clam_anti-virus clamav 0.60p - - cpe:2.3:a:clam_anti-virus:clamav:0.60p:*:*:*:*:*:*:*
clam_anti-virus clamav 0.65 - - cpe:2.3:a:clam_anti-virus:clamav:0.65:*:*:*:*:*:*:*
clam_anti-virus clamav 0.67 - - cpe:2.3:a:clam_anti-virus:clamav:0.67:*:*:*:*:*:*:*
clam_anti-virus clamav 0.68 - - cpe:2.3:a:clam_anti-virus:clamav:0.68:*:*:*:*:*:*:*
clam_anti-virus clamav 0.68.1 - - cpe:2.3:a:clam_anti-virus:clamav:0.68.1:*:*:*:*:*:*:*
clam_anti-virus clamav 0.70 - - cpe:2.3:a:clam_anti-virus:clamav:0.70:*:*:*:*:*:*:*
clam_anti-virus clamav 0.71 - - cpe:2.3:a:clam_anti-virus:clamav:0.71:*:*:*:*:*:*:*
clam_anti-virus clamav 0.72 - - cpe:2.3:a:clam_anti-virus:clamav:0.72:*:*:*:*:*:*:*
clam_anti-virus clamav 0.73 - - cpe:2.3:a:clam_anti-virus:clamav:0.73:*:*:*:*:*:*:*
clam_anti-virus clamav 0.74 - - cpe:2.3:a:clam_anti-virus:clamav:0.74:*:*:*:*:*:*:*
clam_anti-virus clamav 0.75 - - cpe:2.3:a:clam_anti-virus:clamav:0.75:*:*:*:*:*:*:*
clam_anti-virus clamav 0.75.1 - - cpe:2.3:a:clam_anti-virus:clamav:0.75.1:*:*:*:*:*:*:*
clam_anti-virus clamav 0.80 - - cpe:2.3:a:clam_anti-virus:clamav:0.80:*:*:*:*:*:*:*
clam_anti-virus clamav 0.80_rc1 - - cpe:2.3:a:clam_anti-virus:clamav:0.80_rc1:*:*:*:*:*:*:*
clam_anti-virus clamav 0.80_rc2 - - cpe:2.3:a:clam_anti-virus:clamav:0.80_rc2:*:*:*:*:*:*:*
clam_anti-virus clamav 0.80_rc3 - - cpe:2.3:a:clam_anti-virus:clamav:0.80_rc3:*:*:*:*:*:*:*
clam_anti-virus clamav 0.80_rc4 - - cpe:2.3:a:clam_anti-virus:clamav:0.80_rc4:*:*:*:*:*:*:*
clam_anti-virus clamav 0.81 - - cpe:2.3:a:clam_anti-virus:clamav:0.81:*:*:*:*:*:*:*
clam_anti-virus clamav 0.81_rc1 - - cpe:2.3:a:clam_anti-virus:clamav:0.81_rc1:*:*:*:*:*:*:*
clam_anti-virus clamav 0.82 - - cpe:2.3:a:clam_anti-virus:clamav:0.82:*:*:*:*:*:*:*
clam_anti-virus clamav 0.83 - - cpe:2.3:a:clam_anti-virus:clamav:0.83:*:*:*:*:*:*:*
clam_anti-virus clamav 0.84 - - cpe:2.3:a:clam_anti-virus:clamav:0.84:*:*:*:*:*:*:*
clam_anti-virus clamav 0.84_rc1 - - cpe:2.3:a:clam_anti-virus:clamav:0.84_rc1:*:*:*:*:*:*:*
clam_anti-virus clamav 0.84_rc2 - - cpe:2.3:a:clam_anti-virus:clamav:0.84_rc2:*:*:*:*:*:*:*
clam_anti-virus clamav 0.85 - - cpe:2.3:a:clam_anti-virus:clamav:0.85:*:*:*:*:*:*:*
clam_anti-virus clamav 0.85.1 - - cpe:2.3:a:clam_anti-virus:clamav:0.85.1:*:*:*:*:*:*:*
clam_anti-virus clamav 0.86 - - cpe:2.3:a:clam_anti-virus:clamav:0.86:*:*:*:*:*:*:*
clam_anti-virus clamav 0.86.1 - - cpe:2.3:a:clam_anti-virus:clamav:0.86.1:*:*:*:*:*:*:*
clam_anti-virus clamav 0.86.2 - - cpe:2.3:a:clam_anti-virus:clamav:0.86.2:*:*:*:*:*:*:*
clam_anti-virus clamav 0.86_rc1 - - cpe:2.3:a:clam_anti-virus:clamav:0.86_rc1:*:*:*:*:*:*:*
clam_anti-virus clamav 0.87 - - cpe:2.3:a:clam_anti-virus:clamav:0.87:*:*:*:*:*:*:*
clam_anti-virus clamav 0.87.1 - - cpe:2.3:a:clam_anti-virus:clamav:0.87.1:*:*:*:*:*:*:*
clam_anti-virus clamav 0.88 - - cpe:2.3:a:clam_anti-virus:clamav:0.88:*:*:*:*:*:*:*
clam_anti-virus clamav 0.88.1 - - cpe:2.3:a:clam_anti-virus:clamav:0.88.1:*:*:*:*:*:*:*
clam_anti-virus clamav 0.88.3 - - cpe:2.3:a:clam_anti-virus:clamav:0.88.3:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
ADV-2006-4750 vdb-entry
cve.org
访问
ADV-2006-4034 vdb-entry
cve.org
访问
22488 third-party-advisory
cve.org
访问
22370 third-party-advisory
cve.org
访问
VU#180864 third-party-advisory
cve.org
访问
SUSE-SA:2006:060 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
MDKSA-2006:184 vendor-advisory
cve.org
访问
22626 third-party-advisory
cve.org
访问
ADV-2006-4136 vdb-entry
cve.org
访问
22421 third-party-advisory
cve.org
访问
20061016 Clam AntiVirus ClamAV rebuildpe Heap Overflow Vulnerability third-party-advisory
cve.org
访问
ADV-2006-4264 vdb-entry
cve.org
访问
23155 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
20535 vdb-entry
cve.org
访问
APPLE-SA-2006-11-28 vendor-advisory
cve.org
访问
GLSA-200610-10 vendor-advisory
cve.org
访问
TA06-333A third-party-advisory
cve.org
访问
1017068 vdb-entry
cve.org
访问
DSA-1196 vendor-advisory
cve.org
访问
clamav-rebuildpe-bo(29607) vdb-entry
cve.org
访问
22551 third-party-advisory
cve.org
访问
22537 third-party-advisory
cve.org
访问
22498 third-party-advisory
cve.org
访问
ExploitDB EDB-2587 EXPLOIT
exploitdb
访问
Download Exploit EDB-2587 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2006-4182 ADVISORY
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2006-10-16 23:00:00
修改时间:
2024-08-07 18:57:46
创建时间:
2025-11-11 15:32:36
更新时间:
2026-01-19 09:42:05
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2006-4182 2025-11-11 15:17:44 2025-11-11 07:32:36
NVD nvd_CVE-2006-4182 2025-11-11 14:51:51 2025-11-11 07:41:21
CNNVD cnnvd_CNNVD-200610-216 2025-11-11 15:08:53 2025-11-11 07:49:11
EXPLOITDB exploitdb_EDB-2587 2025-11-11 15:05:27 2025-11-11 08:22:18
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:22:18
references_count: 25 → 28; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 25 -> 28
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:49:11
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200610-216; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200610-216
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:21
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 48; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 48
  • data_sources: ['cve'] -> ['cve', 'nvd']