CVE编号
CVE-2006-6481利用情况
暂无补丁情况
官方补丁披露时间
2006-12-12漏洞描述
Clam AntiVirus(ClamAV)0.88.6允许远程攻击者通过在文档周围包裹多层多部分/混合内容来导致拒绝服务(堆栈溢出和应用程序崩溃),此漏洞不同于CVE-2006-5874和CVE-2006 -6406。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://docs.info.apple.com/article.html?artnum=307562 | |
http://kolab.org/security/kolab-vendor-notice-14.txt | |
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html | |
http://osvdb.org/31283 | |
http://secunia.com/advisories/23347 | |
http://secunia.com/advisories/23362 | |
http://secunia.com/advisories/23379 | |
http://secunia.com/advisories/23404 | |
http://secunia.com/advisories/23411 | |
http://secunia.com/advisories/23417 | |
http://secunia.com/advisories/23460 | |
http://secunia.com/advisories/29420 | |
http://security.gentoo.org/glsa/glsa-200612-18.xml | |
http://www.debian.org/security/2006/dsa-1238 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:230 | |
http://www.novell.com/linux/security/advisories/2006_78_clamav.html | |
http://www.quantenblog.net/security/virus-scanner-bypass | |
http://www.securityfocus.com/bid/21609 | |
http://www.trustix.org/errata/2006/0072/ | |
http://www.vupen.com/english/advisories/2006/4948 | |
http://www.vupen.com/english/advisories/2006/5113 | |
http://www.vupen.com/english/advisories/2008/0924/references |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | clam_anti-virus | clamav | 0.88.6 | - | |||||
运行在以下环境 | |||||||||
系统 | debian_3.1 | clamav | * |
Up to (excluding) 0.84-2.sarge.13 |
- 攻击路径 远程
- 攻击复杂度 容易
- 权限要求 无需权限
- 影响范围 全局影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 DoS
- 全网数量 N/A
还没有评论,来说两句吧...