Vulnerabilites related to sophos - anti-virus7.6.3
Vulnerability from fkie_nvd
Published
2009-08-06 00:30
Modified
2025-04-09 00:30
Severity ?
Summary
Sophos Anti-Virus for Windows before 7.6.3, Anti-Virus for Windows NT/9x before 4.7.18, Anti-Virus for OS X before 4.9.18, Anti-Virus for Linux before 6.4.5, Anti-Virus for UNIX before 7.0.5, Anti-Virus for Unix and Netware before 4.37.0, Sophos EM Library, and Sophos small business solutions, when CAB archive scanning is enabled, allows remote attackers to cause a denial of service (segmentation fault) via a "fuzzed" CAB archive file, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats.
Impacted products
Vendor Product Version
sophos anti-virus 4.7.18
sophos anti-virus 4.7.18
sophos anti-virus 4.9.18
sophos anti-virus 4.37.0
sophos anti-virus 6.4.5
sophos anti-virus 7.0.5
sophos anti-virus7.6.3 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.18:*:windows-nt:*:*:*:*:*",
              "matchCriteriaId": "F1BEF5DD-8418-4C76-9351-ACD3ED25236E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.18:*:windows_9x:*:*:*:*:*",
              "matchCriteriaId": "A15CB3E6-A97F-491B-B27E-E4AF255E0088",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.9.18:*:os_x:*:*:*:*:*",
              "matchCriteriaId": "E61D3204-DE1E-489E-9624-DD02F1B58F95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.37.0:*:netware:*:*:*:*:*",
              "matchCriteriaId": "77FF9B2E-2A38-4A13-AA20-83081A5D9AF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:6.4.5:*:linux:*:*:*:*:*",
              "matchCriteriaId": "550B1595-4C9F-412C-B903-DDD8202C1F4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:7.0.5:*:unix:*:*:*:*:*",
              "matchCriteriaId": "52F3B857-84EC-4FB8-A332-B7B81BCEB28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus7.6.3:*:windows:*:*:*:*:*:*",
              "matchCriteriaId": "98EFEFC0-92AC-43A6-A072-B6AD2D4B0984",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Sophos Anti-Virus for Windows before 7.6.3, Anti-Virus for Windows NT/9x before 4.7.18, Anti-Virus for OS X before 4.9.18, Anti-Virus for Linux before 6.4.5, Anti-Virus for UNIX before 7.0.5, Anti-Virus for Unix and Netware before 4.37.0, Sophos EM Library, and Sophos small business solutions, when CAB archive scanning is enabled, allows remote attackers to cause a denial of service (segmentation fault) via a \"fuzzed\" CAB archive file, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats."
    },
    {
      "lang": "es",
      "value": "Sophos Anti-Virus para Windows anteriores a v7.6.3, Anti-Virus para Windows NT/9x anteriores a v.4.7.18, Anti-Virus para OS X anteriores a v.4.9.18, Anti-Virus para Linux anteriores a v.6.4.5, Anti-Virus para UNIX anteriores a v7.0.5, Anti-Virus para Unix y Netware anteriores a v.4.37.0, Sophos EM Library, y Sophos small business solutions, cuando el archivo escaneado CAB est\u00e1 activo, permite a atacantes remotos causar una denegaci\u00f3n de servicio (falta de segmentaci\u00f3n) a trav\u00e9s del fichero \"fuzzed\" CAB, como se ha demostrado mediante la suite para el testeo de formatos de archivo PROTOS GENOME."
    }
  ],
  "id": "CVE-2008-6903",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-08-06T00:30:00.297",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/50863"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/33177"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/32748"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securitytracker.com/id?1021476"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.sophos.com/support/knowledgebase/article/50611.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/3458"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/50863"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/33177"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/32748"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securitytracker.com/id?1021476"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.sophos.com/support/knowledgebase/article/50611.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/3458"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-08-06 01:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in Sophos SAVScan 4.33.0 for Linux, and possibly other products and versions, allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via crafted files that have been packed with (1) armadillo, (2) asprotect, or (3) asprotectSKE.
Impacted products
Vendor Product Version
sophos anti-virus 4.7.18
sophos anti-virus 4.7.18
sophos anti-virus 4.9.18
sophos anti-virus 4.37.0
sophos anti-virus 6.4.5
sophos anti-virus 7.0.5
sophos anti-virus7.6.3 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.18:*:windows-nt:*:*:*:*:*",
              "matchCriteriaId": "F1BEF5DD-8418-4C76-9351-ACD3ED25236E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.18:*:windows_9x:*:*:*:*:*",
              "matchCriteriaId": "A15CB3E6-A97F-491B-B27E-E4AF255E0088",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.9.18:*:os_x:*:*:*:*:*",
              "matchCriteriaId": "E61D3204-DE1E-489E-9624-DD02F1B58F95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.37.0:*:netware:*:*:*:*:*",
              "matchCriteriaId": "77FF9B2E-2A38-4A13-AA20-83081A5D9AF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:6.4.5:*:linux:*:*:*:*:*",
              "matchCriteriaId": "550B1595-4C9F-412C-B903-DDD8202C1F4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:7.0.5:*:unix:*:*:*:*:*",
              "matchCriteriaId": "52F3B857-84EC-4FB8-A332-B7B81BCEB28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus7.6.3:*:windows:*:*:*:*:*:*",
              "matchCriteriaId": "98EFEFC0-92AC-43A6-A072-B6AD2D4B0984",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Sophos SAVScan 4.33.0 for Linux, and possibly other products and versions, allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via crafted files that have been packed with (1) armadillo, (2) asprotect, or (3) asprotectSKE."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad sin especificar en Sophos SAVScan v4.33.0 de Linux, y probablemente otros productos y versiones, permiten a atacantes remotos causar una denegaci\u00f3n de servicio (falta de segmentaci\u00f3n) y probablemente ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s de archivos manipulados que han sido empaquetados con (1)armadillo, (2) asprotect, o (3) asprotectSKE."
    }
  ],
  "id": "CVE-2008-6904",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-08-06T01:30:00.217",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/32748"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.sophos.com/support/knowledgebase/article/50611.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52443"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/32748"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.sophos.com/support/knowledgebase/article/50611.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52443"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2008-6904 (GCVE-0-2008-6904)
Vulnerability from cvelistv5
Published
2009-08-06 01:00
Modified
2024-08-07 11:49
Severity ?
CWE
  • n/a
Summary
Multiple unspecified vulnerabilities in Sophos SAVScan 4.33.0 for Linux, and possibly other products and versions, allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via crafted files that have been packed with (1) armadillo, (2) asprotect, or (3) asprotectSKE.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:49:02.265Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "savscan-armadillo-code-execution(52443)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52443"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.sophos.com/support/knowledgebase/article/50611.html"
          },
          {
            "name": "20081210 [IVIZ-08-015] Sophos Antivirus for Linux vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2"
          },
          {
            "name": "32748",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32748"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Sophos SAVScan 4.33.0 for Linux, and possibly other products and versions, allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via crafted files that have been packed with (1) armadillo, (2) asprotect, or (3) asprotectSKE."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "savscan-armadillo-code-execution(52443)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52443"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.sophos.com/support/knowledgebase/article/50611.html"
        },
        {
          "name": "20081210 [IVIZ-08-015] Sophos Antivirus for Linux vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2"
        },
        {
          "name": "32748",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32748"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-6904",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Sophos SAVScan 4.33.0 for Linux, and possibly other products and versions, allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via crafted files that have been packed with (1) armadillo, (2) asprotect, or (3) asprotectSKE."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "savscan-armadillo-code-execution(52443)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52443"
            },
            {
              "name": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html",
              "refsource": "MISC",
              "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html"
            },
            {
              "name": "http://www.sophos.com/support/knowledgebase/article/50611.html",
              "refsource": "MISC",
              "url": "http://www.sophos.com/support/knowledgebase/article/50611.html"
            },
            {
              "name": "20081210 [IVIZ-08-015] Sophos Antivirus for Linux vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2"
            },
            {
              "name": "32748",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32748"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-6904",
    "datePublished": "2009-08-06T01:00:00",
    "dateReserved": "2009-08-05T00:00:00",
    "dateUpdated": "2024-08-07T11:49:02.265Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-6903 (GCVE-0-2008-6903)
Vulnerability from cvelistv5
Published
2009-08-06 00:00
Modified
2024-08-07 11:49
Severity ?
CWE
  • n/a
Summary
Sophos Anti-Virus for Windows before 7.6.3, Anti-Virus for Windows NT/9x before 4.7.18, Anti-Virus for OS X before 4.9.18, Anti-Virus for Linux before 6.4.5, Anti-Virus for UNIX before 7.0.5, Anti-Virus for Unix and Netware before 4.37.0, Sophos EM Library, and Sophos small business solutions, when CAB archive scanning is enabled, allows remote attackers to cause a denial of service (segmentation fault) via a "fuzzed" CAB archive file, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:49:02.354Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html"
          },
          {
            "name": "33177",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33177"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sophos.com/support/knowledgebase/article/50611.html"
          },
          {
            "name": "1021476",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1021476"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html"
          },
          {
            "name": "20081210 [IVIZ-08-015] Sophos Antivirus for Linux vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2"
          },
          {
            "name": "ADV-2008-3458",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3458"
          },
          {
            "name": "50863",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/50863"
          },
          {
            "name": "32748",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32748"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sophos Anti-Virus for Windows before 7.6.3, Anti-Virus for Windows NT/9x before 4.7.18, Anti-Virus for OS X before 4.9.18, Anti-Virus for Linux before 6.4.5, Anti-Virus for UNIX before 7.0.5, Anti-Virus for Unix and Netware before 4.37.0, Sophos EM Library, and Sophos small business solutions, when CAB archive scanning is enabled, allows remote attackers to cause a denial of service (segmentation fault) via a \"fuzzed\" CAB archive file, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-08-19T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html"
        },
        {
          "name": "33177",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33177"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sophos.com/support/knowledgebase/article/50611.html"
        },
        {
          "name": "1021476",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1021476"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html"
        },
        {
          "name": "20081210 [IVIZ-08-015] Sophos Antivirus for Linux vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2"
        },
        {
          "name": "ADV-2008-3458",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3458"
        },
        {
          "name": "50863",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/50863"
        },
        {
          "name": "32748",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32748"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-6903",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sophos Anti-Virus for Windows before 7.6.3, Anti-Virus for Windows NT/9x before 4.7.18, Anti-Virus for OS X before 4.9.18, Anti-Virus for Linux before 6.4.5, Anti-Virus for UNIX before 7.0.5, Anti-Virus for Unix and Netware before 4.37.0, Sophos EM Library, and Sophos small business solutions, when CAB archive scanning is enabled, allows remote attackers to cause a denial of service (segmentation fault) via a \"fuzzed\" CAB archive file, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html",
              "refsource": "MISC",
              "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html"
            },
            {
              "name": "33177",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33177"
            },
            {
              "name": "http://www.sophos.com/support/knowledgebase/article/50611.html",
              "refsource": "CONFIRM",
              "url": "http://www.sophos.com/support/knowledgebase/article/50611.html"
            },
            {
              "name": "1021476",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1021476"
            },
            {
              "name": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html",
              "refsource": "MISC",
              "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html"
            },
            {
              "name": "20081210 [IVIZ-08-015] Sophos Antivirus for Linux vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2"
            },
            {
              "name": "ADV-2008-3458",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3458"
            },
            {
              "name": "50863",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/50863"
            },
            {
              "name": "32748",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32748"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-6903",
    "datePublished": "2009-08-06T00:00:00",
    "dateReserved": "2009-08-05T00:00:00",
    "dateUpdated": "2024-08-07T11:49:02.354Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}