Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2006-4182Improper Restriction of Operations within the Bounds of a Memory Buffer in Anti-virus Clamav

7 documents7 sources
Severity
7.5HIGHNVD
EPSS
16.6%
top 5.07%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedOct 16
Latest updateMay 1

Description

Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, allows remote attackers to cause a denial of service (scanning service crash) and execute arbitrary code via a crafted Portable Executable (PE) file that leads to a heap-based buffer overflow when less memory is allocated than expected.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages2 packages

Debianclamav/clamav< 0.88.5-1+3
NVDclam_anti-virus/clamav0.88.4+47

Patches

🔴Vulnerability Details

3
GHSA
GHSA-f7j9-whhg-c5h7: Integer overflow in ClamAV 02022-05-01
CVEList
CVE-2006-4182: Integer overflow in ClamAV 02006-10-16
OSV
CVE-2006-4182: Integer overflow in ClamAV 02006-10-16

💥Exploits & PoCs

1
Exploit-DB
Clam AntiVirus 0.88.4 - 'rebuildpe' Remote Heap Overflow (PoC)2006-10-17

📋Vendor Advisories

1
Debian
CVE-2006-4182: clamav - Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, ...2006

💬Community

1
Bugzilla
clamav < 0.88.5 CHM and PE vulnerabilities2006-10-16
CVE-2006-4182 — Clam Anti-virus Clamav vulnerability | cvebase