Upstream information

CVE-2007-1997 at MITRE

Description

Integer signedness error in the (1) cab_unstore and (2) cab_extract functions in libclamav/cab.c in Clam AntiVirus (ClamAV) before 0.90.2 allow remote attackers to execute arbitrary code via a crafted CHM file that contains a negative integer, which passes a signed comparison and leads to a stack-based buffer overflow.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 264189 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Server 11 SP1
  • clamav >= 0.96-0.12.1
Patchnames:
SUSE Linux Enterprise Server 11 SP1 GA clamav-0.96-0.12.1
SUSE Linux Enterprise Server 11 SP2
  • clamav >= 0.97.3-0.2.1
Patchnames:
SUSE Linux Enterprise Server 11 SP2 GA clamav-0.97.3-0.2.1
SUSE Linux Enterprise Server 11 SP3
  • clamav >= 0.97.7-0.3.1
Patchnames:
SUSE Linux Enterprise Server 11 SP3 GA clamav-0.97.7-0.3.1
SUSE Linux Enterprise Server 11 SP4
  • clamav >= 0.98.7-0.3.1
Patchnames:
SUSE Linux Enterprise Server 11 SP4 GA clamav-0.98.7-0.3.1
openSUSE Tumbleweed
  • clamav >= 0.103.3-1.4
  • clamav-devel >= 0.103.3-1.4
  • clamav-milter >= 0.103.3-1.4
  • libclamav9 >= 0.103.3-1.4
  • libfreshclam2 >= 0.103.3-1.4
Patchnames:
openSUSE-Tumbleweed-2024-10685


SUSE Timeline for this CVE

CVE page created: Fri Jun 28 03:05:41 2013
CVE page last modified: Sat Jun 15 20:49:16 2024