Vulnerabilites related to f-secure - internet_gatekeeper
CVE-2020-9342 (GCVE-0-2020-9342)
Vulnerability from cvelistv5
Published
2020-02-22 22:41
Modified
2024-08-04 10:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The F-Secure AV parsing engine before 2020-02-05 allows virus-detection bypass via crafted Compression Method data in a GZIP archive. This affects versions before 17.0.605.474 (on Linux) of Cloud Protection For Salesforce, Email and Server Security, and Internet GateKeeper.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:26:16.058Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.zoller.lu/p/tzo-16-2020-f-secure-generic-malformed.html" }, { "name": "20200224 [TZO-16-2020] - F-SECURE Generic Malformed Container bypass (GZIP)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2020/Feb/33" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/156506/F-SECURE-Generic-Malformed-Container-Bypass.html" }, { "name": "20200227 [TZO-16-2020] - F-SECURE Generic Malformed Container bypass (GZIP)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Feb/33" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The F-Secure AV parsing engine before 2020-02-05 allows virus-detection bypass via crafted Compression Method data in a GZIP archive. This affects versions before 17.0.605.474 (on Linux) of Cloud Protection For Salesforce, Email and Server Security, and Internet GateKeeper." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-28T09:06:11", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.zoller.lu/p/tzo-16-2020-f-secure-generic-malformed.html" }, { "name": "20200224 [TZO-16-2020] - F-SECURE Generic Malformed Container bypass (GZIP)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2020/Feb/33" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/156506/F-SECURE-Generic-Malformed-Container-Bypass.html" }, { "name": "20200227 [TZO-16-2020] - F-SECURE Generic Malformed Container bypass (GZIP)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Feb/33" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-9342", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The F-Secure AV parsing engine before 2020-02-05 allows virus-detection bypass via crafted Compression Method data in a GZIP archive. This affects versions before 17.0.605.474 (on Linux) of Cloud Protection For Salesforce, Email and Server Security, and Internet GateKeeper." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.zoller.lu/p/tzo-16-2020-f-secure-generic-malformed.html", "refsource": "MISC", "url": "https://blog.zoller.lu/p/tzo-16-2020-f-secure-generic-malformed.html" }, { "name": "20200224 [TZO-16-2020] - F-SECURE Generic Malformed Container bypass (GZIP)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2020/Feb/33" }, { "name": "http://packetstormsecurity.com/files/156506/F-SECURE-Generic-Malformed-Container-Bypass.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/156506/F-SECURE-Generic-Malformed-Container-Bypass.html" }, { "name": "20200227 [TZO-16-2020] - F-SECURE Generic Malformed Container bypass (GZIP)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Feb/33" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-9342", "datePublished": "2020-02-22T22:41:28", "dateReserved": "2020-02-22T00:00:00", "dateUpdated": "2024-08-04T10:26:16.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-2965 (GCVE-0-2007-2965)
Vulnerability from cvelistv5
Published
2007-05-31 23:00
Modified
2024-08-07 13:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in the Real-time Scanning component in multiple F-Secure products, including Internet Security 2005, 2006 and 2007; Anti-Virus 2005, 2006 and 2007; and Solutions based on F-Secure Protection Service for Consumers 6.40 and earlier allows local users to gain privileges via a crafted I/O request packet (IRP), related to IOCTL (Input/Output Control) and "access validation of the address space."
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:57:54.743Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1018148", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018148" }, { "name": "1018146", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018146" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/security/fsc-2007-2.shtml" }, { "name": "fsecure-realtime-privilege-escalation(34579)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34579" }, { "name": "ADV-2007-1985", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1985" }, { "name": "36727", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36727" }, { "name": "25439", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25439" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Real-time Scanning component in multiple F-Secure products, including Internet Security 2005, 2006 and 2007; Anti-Virus 2005, 2006 and 2007; and Solutions based on F-Secure Protection Service for Consumers 6.40 and earlier allows local users to gain privileges via a crafted I/O request packet (IRP), related to IOCTL (Input/Output Control) and \"access validation of the address space.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1018148", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018148" }, { "name": "1018146", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018146" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/security/fsc-2007-2.shtml" }, { "name": "fsecure-realtime-privilege-escalation(34579)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34579" }, { "name": "ADV-2007-1985", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1985" }, { "name": "36727", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36727" }, { "name": "25439", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25439" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2965", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Real-time Scanning component in multiple F-Secure products, including Internet Security 2005, 2006 and 2007; Anti-Virus 2005, 2006 and 2007; and Solutions based on F-Secure Protection Service for Consumers 6.40 and earlier allows local users to gain privileges via a crafted I/O request packet (IRP), related to IOCTL (Input/Output Control) and \"access validation of the address space.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1018148", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018148" }, { "name": "1018146", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018146" }, { "name": "http://www.f-secure.com/security/fsc-2007-2.shtml", "refsource": "CONFIRM", "url": "http://www.f-secure.com/security/fsc-2007-2.shtml" }, { "name": "fsecure-realtime-privilege-escalation(34579)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34579" }, { "name": "ADV-2007-1985", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1985" }, { "name": "36727", "refsource": "OSVDB", "url": "http://osvdb.org/36727" }, { "name": "25439", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25439" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2965", "datePublished": "2007-05-31T23:00:00", "dateReserved": "2007-05-31T00:00:00", "dateUpdated": "2024-08-07T13:57:54.743Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28878 (GCVE-0-2022-28878)
Vulnerability from cvelistv5
Published
2022-07-22 15:29
Modified
2024-08-03 06:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial-of-Service (DoS) Vulnerability
Summary
A Denial-of-Service vulnerability was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed APK file it is possible that can crash the scanning engine.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.155Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "All F-Secure and WithSecure Endpoint Protection products for Windows \u0026 Mac F-Secure Linux Security 64 F-Secure Linux Security 32 F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection", "vendor": "F-Secure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service vulnerability was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed APK file it is possible that can crash the scanning engine." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-Service (DoS) Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-22T15:29:00", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-07-11_07" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2022-28878", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "All F-Secure and WithSecure Endpoint Protection products for Windows \u0026 Mac F-Secure Linux Security 64 F-Secure Linux Security 32 F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection", "version": { "version_data": [ { "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Denial-of-Service vulnerability was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed APK file it is possible that can crash the scanning engine." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-Service (DoS) Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "name": "https://www.withsecure.com/en/support/security-advisories", "refsource": "MISC", "url": "https://www.withsecure.com/en/support/security-advisories" } ] }, "solution": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-07-11_07" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28878", "datePublished": "2022-07-22T15:29:00", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-03T06:03:53.155Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33603 (GCVE-0-2021-33603)
Vulnerability from cvelistv5
Published
2021-10-08 09:45
Modified
2024-08-03 23:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service Vulnerability
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the AVPACK module component used in certain F-Secure products can crash while scanning a fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service (DoS) of the Anti-Virus engine.
References
► | URL | Tags |
---|---|---|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.162Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33603" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit) F-Secure Linux Security 64 F-Secure Atlant F-Secure Cloud Protection for Salesforce and Cloud Protection for Microsoft Office 365", "vendor": "F-Secure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the AVPACK module component used in certain F-Secure products can crash while scanning a fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service (DoS) of the Anti-Virus engine." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-08T09:45:10", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33603" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn update 2021-09-29_03\n" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-33603", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit) F-Secure Linux Security 64 F-Secure Atlant F-Secure Cloud Protection for Salesforce and Cloud Protection for Microsoft Office 365", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the AVPACK module component used in certain F-Secure products can crash while scanning a fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service (DoS) of the Anti-Virus engine." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33603", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33603" } ] }, "solution": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn update 2021-09-29_03\n" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2021-33603", "datePublished": "2021-10-08T09:45:10", "dateReserved": "2021-05-27T00:00:00", "dateUpdated": "2024-08-03T23:50:43.162Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-0338 (GCVE-0-2006-0338)
Vulnerability from cvelistv5
Published
2006-01-21 00:00
Modified
2024-08-07 16:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allow remote attackers to hide arbitrary files and data via malformed (1) RAR and (2) ZIP archives, which are not properly scanned.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:34:14.012Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/security/fsc-2006-1.shtml" }, { "name": "fsecure-rar-zip-scan-bypass(24199)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24199" }, { "name": "1015510", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015510" }, { "name": "18529", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18529" }, { "name": "22633", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/22633" }, { "name": "1015509", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015509" }, { "name": "16309", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16309" }, { "name": "Q-103", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/q-103.shtml" }, { "name": "1015508", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015508" }, { "name": "1015507", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015507" }, { "name": "ADV-2006-0257", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0257" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-01-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allow remote attackers to hide arbitrary files and data via malformed (1) RAR and (2) ZIP archives, which are not properly scanned." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/security/fsc-2006-1.shtml" }, { "name": "fsecure-rar-zip-scan-bypass(24199)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24199" }, { "name": "1015510", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015510" }, { "name": "18529", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18529" }, { "name": "22633", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/22633" }, { "name": "1015509", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015509" }, { "name": "16309", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16309" }, { "name": "Q-103", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/q-103.shtml" }, { "name": "1015508", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015508" }, { "name": "1015507", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015507" }, { "name": "ADV-2006-0257", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0257" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0338", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allow remote attackers to hide arbitrary files and data via malformed (1) RAR and (2) ZIP archives, which are not properly scanned." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.f-secure.com/security/fsc-2006-1.shtml", "refsource": "CONFIRM", "url": "http://www.f-secure.com/security/fsc-2006-1.shtml" }, { "name": "fsecure-rar-zip-scan-bypass(24199)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24199" }, { "name": "1015510", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015510" }, { "name": "18529", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18529" }, { "name": "22633", "refsource": "OSVDB", "url": "http://www.osvdb.org/22633" }, { "name": "1015509", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015509" }, { "name": "16309", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16309" }, { "name": "Q-103", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/q-103.shtml" }, { "name": "1015508", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015508" }, { "name": "1015507", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015507" }, { "name": "ADV-2006-0257", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0257" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0338", "datePublished": "2006-01-21T00:00:00", "dateReserved": "2006-01-20T00:00:00", "dateUpdated": "2024-08-07T16:34:14.012Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28880 (GCVE-0-2022-28880)
Vulnerability from cvelistv5
Published
2022-08-05 16:46
Modified
2024-08-03 06:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial-of-Service (DoS) Vulnerability
Summary
A Denial-of-Service vulnerability was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed PE32-bit files it is possible that can crash the scanning engine. The exploit can be triggered remotely by an attacker.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.withsecure.com/en/expertise/people" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/home/support/vulnerability-reward-program/hall-of-fame" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "All F-Secure and WithSecure Endpoint Protection products for Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection", "vendor": "F-Secure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service vulnerability was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed PE32-bit files it is possible that can crash the scanning engine. The exploit can be triggered remotely by an attacker." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-Service (DoS) Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-05T16:46:48", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.withsecure.com/en/expertise/people" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/home/support/vulnerability-reward-program/hall-of-fame" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-07-29_13" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability ", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2022-28880", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability " }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "All F-Secure and WithSecure Endpoint Protection products for Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Denial-of-Service vulnerability was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed PE32-bit files it is possible that can crash the scanning engine. The exploit can be triggered remotely by an attacker." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-Service (DoS) Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.withsecure.com/en/expertise/people", "refsource": "MISC", "url": "https://www.withsecure.com/en/expertise/people" }, { "name": "https://www.f-secure.com/en/home/support/vulnerability-reward-program/hall-of-fame", "refsource": "MISC", "url": "https://www.f-secure.com/en/home/support/vulnerability-reward-program/hall-of-fame" } ] }, "solution": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-07-29_13" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28880", "datePublished": "2022-08-05T16:46:48", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-03T06:03:53.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-0350 (GCVE-0-2005-0350)
Vulnerability from cvelistv5
Published
2005-02-11 05:00
Modified
2024-08-07 21:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in multiple F-Secure Anti-Virus and Internet Security products allows remote attackers to execute arbitrary code via a crafted ARJ archive.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:13:53.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20050210 F-Secure AntiVirus Library Heap Overflow", "tags": [ "third-party-advisory", "x_refsource_ISS", "x_transferred" ], "url": "http://xforce.iss.net/xforce/alerts/id/188" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/security/fsc-2005-1.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-02-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in multiple F-Secure Anti-Virus and Internet Security products allows remote attackers to execute arbitrary code via a crafted ARJ archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-15T16:38:04", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20050210 F-Secure AntiVirus Library Heap Overflow", "tags": [ "third-party-advisory", "x_refsource_ISS" ], "url": "http://xforce.iss.net/xforce/alerts/id/188" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/security/fsc-2005-1.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0350", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in multiple F-Secure Anti-Virus and Internet Security products allows remote attackers to execute arbitrary code via a crafted ARJ archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20050210 F-Secure AntiVirus Library Heap Overflow", "refsource": "ISS", "url": "http://xforce.iss.net/xforce/alerts/id/188" }, { "name": "http://www.f-secure.com/security/fsc-2005-1.shtml", "refsource": "CONFIRM", "url": "http://www.f-secure.com/security/fsc-2005-1.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0350", "datePublished": "2005-02-11T05:00:00", "dateReserved": "2005-02-11T00:00:00", "dateUpdated": "2024-08-07T21:13:53.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-2967 (GCVE-0-2007-2967)
Vulnerability from cvelistv5
Published
2007-05-31 23:00
Modified
2024-08-07 13:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070522 allow remote attackers to cause a denial of service (file scanning infinite loop) via certain crafted (1) ARJ archives or (2) FSG packed files.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:57:54.963Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "36725", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36725" }, { "name": "20070604 n.runs-SA-2007.014 - F-Secure Antivirus ARJ parsing Infinite Loop Advisory", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063714.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nruns.com/security_advisory_fsecure_arj.php" }, { "name": "1018148", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018148" }, { "name": "1018147", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018147" }, { "name": "1018146", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018146" }, { "name": "20070604 n.runs-SA-2007.015 - F-Secure Antivirus FSG packed files parsing Infinite Loop Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/470484/100/0/threaded" }, { "name": "ADV-2007-1985", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1985" }, { "name": "20070604 n.runs-SA-2007.015 - F-Secure Antivirus FSG packed files parsing Infinite Loop Advisory", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063715.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nruns.com/security_advisory_fsecure_fsg.php" }, { "name": "36726", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36726" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/security/fsc-2007-3.shtml" }, { "name": "25440", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25440" }, { "name": "20070604 n.runs-SA-2007.014 - F-Secure Antivirus ARJ parsing Infinite Loop Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/470462/100/0/threaded" }, { "name": "fsecure-unspecified-archive-dos(34581)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34581" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070522 allow remote attackers to cause a denial of service (file scanning infinite loop) via certain crafted (1) ARJ archives or (2) FSG packed files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "36725", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36725" }, { "name": "20070604 n.runs-SA-2007.014 - F-Secure Antivirus ARJ parsing Infinite Loop Advisory", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063714.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nruns.com/security_advisory_fsecure_arj.php" }, { "name": "1018148", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018148" }, { "name": "1018147", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018147" }, { "name": "1018146", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018146" }, { "name": "20070604 n.runs-SA-2007.015 - F-Secure Antivirus FSG packed files parsing Infinite Loop Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/470484/100/0/threaded" }, { "name": "ADV-2007-1985", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1985" }, { "name": "20070604 n.runs-SA-2007.015 - F-Secure Antivirus FSG packed files parsing Infinite Loop Advisory", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063715.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nruns.com/security_advisory_fsecure_fsg.php" }, { "name": "36726", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36726" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/security/fsc-2007-3.shtml" }, { "name": "25440", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25440" }, { "name": "20070604 n.runs-SA-2007.014 - F-Secure Antivirus ARJ parsing Infinite Loop Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/470462/100/0/threaded" }, { "name": "fsecure-unspecified-archive-dos(34581)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34581" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2967", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070522 allow remote attackers to cause a denial of service (file scanning infinite loop) via certain crafted (1) ARJ archives or (2) FSG packed files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "36725", "refsource": "OSVDB", "url": "http://osvdb.org/36725" }, { "name": "20070604 n.runs-SA-2007.014 - F-Secure Antivirus ARJ parsing Infinite Loop Advisory", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063714.html" }, { "name": "http://www.nruns.com/security_advisory_fsecure_arj.php", "refsource": "MISC", "url": "http://www.nruns.com/security_advisory_fsecure_arj.php" }, { "name": "1018148", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018148" }, { "name": "1018147", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018147" }, { "name": "1018146", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018146" }, { "name": "20070604 n.runs-SA-2007.015 - F-Secure Antivirus FSG packed files parsing Infinite Loop Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/470484/100/0/threaded" }, { "name": "ADV-2007-1985", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1985" }, { "name": "20070604 n.runs-SA-2007.015 - F-Secure Antivirus FSG packed files parsing Infinite Loop Advisory", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063715.html" }, { "name": "http://www.nruns.com/security_advisory_fsecure_fsg.php", "refsource": "MISC", "url": "http://www.nruns.com/security_advisory_fsecure_fsg.php" }, { "name": "36726", "refsource": "OSVDB", "url": "http://osvdb.org/36726" }, { "name": "http://www.f-secure.com/security/fsc-2007-3.shtml", "refsource": "CONFIRM", "url": "http://www.f-secure.com/security/fsc-2007-3.shtml" }, { "name": "25440", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25440" }, { "name": "20070604 n.runs-SA-2007.014 - F-Secure Antivirus ARJ parsing Infinite Loop Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/470462/100/0/threaded" }, { "name": "fsecure-unspecified-archive-dos(34581)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34581" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2967", "datePublished": "2007-05-31T23:00:00", "dateReserved": "2007-05-31T00:00:00", "dateUpdated": "2024-08-07T13:57:54.963Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28887 (GCVE-0-2022-28887)
Vulnerability from cvelistv5
Published
2022-10-12 00:00
Modified
2025-05-15 18:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Multiple Denial-of-Service (DoS) vulnerability
Summary
Multiple Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aerdl.dll unpacker handler function crashes. This can lead to a possible scanning engine crash.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:10:56.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_transferred" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-28887", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-15T18:26:24.456869Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-404", "description": "CWE-404 Improper Resource Shutdown or Release", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-15T18:26:27.910Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "All F-Secure and WithSecure Endpoint Protection products for Windows \u0026 Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper", "vendor": "F-Secure and WithSecure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple Denial-of-Service (DoS) vulnerability was discovered in F-Secure \u0026 WithSecure products whereby the aerdl.dll unpacker handler function crashes. This can lead to a possible scanning engine crash." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Multiple Denial-of-Service (DoS) vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-12T00:00:00.000Z", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "url": "https://www.withsecure.com/en/support/security-advisories" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-09-26_09" } ], "source": { "discovery": "EXTERNAL" }, "title": "Multiple Denial of Service Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28887", "datePublished": "2022-10-12T00:00:00.000Z", "dateReserved": "2022-04-08T00:00:00.000Z", "dateUpdated": "2025-05-15T18:26:27.910Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28875 (GCVE-0-2022-28875)
Vulnerability from cvelistv5
Published
2022-05-25 15:09
Modified
2024-08-03 06:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial-of-Service (DoS) Vulnerability
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aemobile component can crash the scanning engine. The exploit can be triggered remotely by an attacker.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "All F-Secure \u0026 WithSecure endpoint protection products for Windows and Mac. F-Secure Linux Security (32-bit). F-Secure Linux Security (64-bit). F-Secure Atlant. WithSecure Cloud Protection for Salesforce \u0026 WithSecure Collaboration Protection", "vendor": "F-Secure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aemobile component can crash the scanning engine. The exploit can be triggered remotely by an attacker." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-Service (DoS) Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-25T15:09:30", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-05-16_12" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability ", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2022-28875", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability " }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "All F-Secure \u0026 WithSecure endpoint protection products for Windows and Mac. F-Secure Linux Security (32-bit). F-Secure Linux Security (64-bit). F-Secure Atlant. WithSecure Cloud Protection for Salesforce \u0026 WithSecure Collaboration Protection", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aemobile component can crash the scanning engine. The exploit can be triggered remotely by an attacker." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-Service (DoS) Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "name": "https://www.withsecure.com/en/support/security-advisories", "refsource": "MISC", "url": "https://www.withsecure.com/en/support/security-advisories" } ] }, "solution": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-05-16_12" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28875", "datePublished": "2022-05-25T15:09:30", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-03T06:03:53.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-2966 (GCVE-0-2007-2966)
Vulnerability from cvelistv5
Published
2007-05-31 23:00
Modified
2024-08-07 13:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the LHA decompression component in F-Secure anti-virus products for Microsoft Windows and Linux before 20070529 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted LHA archive, related to an integer wrap, a similar issue to CVE-2006-4335.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:57:54.966Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25426", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25426" }, { "name": "1018148", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018148" }, { "name": "1018147", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018147" }, { "name": "1018146", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018146" }, { "name": "ADV-2007-1985", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1985" }, { "name": "20070601 n.runs-SA-2007.013 - F-Secure Antivirus LZH parsing BufferOverflow Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/470256/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/security/fsc-2007-1.shtml" }, { "name": "36724", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36724" }, { "name": "24235", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24235" }, { "name": "fsecure-lzh-bo(34575)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34575" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nruns.com/security_advisory_fsecure_lzh.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the LHA decompression component in F-Secure anti-virus products for Microsoft Windows and Linux before 20070529 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted LHA archive, related to an integer wrap, a similar issue to CVE-2006-4335." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25426", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25426" }, { "name": "1018148", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018148" }, { "name": "1018147", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018147" }, { "name": "1018146", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018146" }, { "name": "ADV-2007-1985", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1985" }, { "name": "20070601 n.runs-SA-2007.013 - F-Secure Antivirus LZH parsing BufferOverflow Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/470256/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/security/fsc-2007-1.shtml" }, { "name": "36724", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36724" }, { "name": "24235", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24235" }, { "name": "fsecure-lzh-bo(34575)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34575" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nruns.com/security_advisory_fsecure_lzh.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2966", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the LHA decompression component in F-Secure anti-virus products for Microsoft Windows and Linux before 20070529 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted LHA archive, related to an integer wrap, a similar issue to CVE-2006-4335." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25426", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25426" }, { "name": "1018148", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018148" }, { "name": "1018147", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018147" }, { "name": "1018146", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018146" }, { "name": "ADV-2007-1985", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1985" }, { "name": "20070601 n.runs-SA-2007.013 - F-Secure Antivirus LZH parsing BufferOverflow Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/470256/100/0/threaded" }, { "name": "http://www.f-secure.com/security/fsc-2007-1.shtml", "refsource": "CONFIRM", "url": "http://www.f-secure.com/security/fsc-2007-1.shtml" }, { "name": "36724", "refsource": "OSVDB", "url": "http://osvdb.org/36724" }, { "name": "24235", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24235" }, { "name": "fsecure-lzh-bo(34575)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34575" }, { "name": "http://www.nruns.com/security_advisory_fsecure_lzh.php", "refsource": "MISC", "url": "http://www.nruns.com/security_advisory_fsecure_lzh.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2966", "datePublished": "2007-05-31T23:00:00", "dateReserved": "2007-05-31T00:00:00", "dateUpdated": "2024-08-07T13:57:54.966Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1425 (GCVE-0-2010-1425)
Vulnerability from cvelistv5
Published
2010-04-15 21:12
Modified
2024-09-17 02:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
F-Secure Internet Security 2010 and earlier; Anti-Virus for Microsoft Exchange 9 and earlier, and for MIMEsweeper 5.61 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, and for Linux 4.02 and earlier; Anti-Virus 2010 and earlier; Home Server Security 2009; Protection Service for Consumers 9 and earlier, for Business - Workstation security 9 and earlier, for Business - Server Security 8 and earlier, and for E-mail and Server security 9 and earlier; Mac Protection build 8060 and earlier; Client Security 9 and earlier; and various Anti-Virus products for Windows, Linux, and Citrix; does not properly detect malware in crafted (1) 7Z, (2) GZIP, (3) CAB, or (4) RAR archives, which makes it easier for remote attackers to avoid detection.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:19.158Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1023841", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023841" }, { "name": "1023842", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023842" }, { "name": "1023843", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023843" }, { "name": "39396", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39396" }, { "name": "ADV-2010-0855", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0855" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "F-Secure Internet Security 2010 and earlier; Anti-Virus for Microsoft Exchange 9 and earlier, and for MIMEsweeper 5.61 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, and for Linux 4.02 and earlier; Anti-Virus 2010 and earlier; Home Server Security 2009; Protection Service for Consumers 9 and earlier, for Business - Workstation security 9 and earlier, for Business - Server Security 8 and earlier, and for E-mail and Server security 9 and earlier; Mac Protection build 8060 and earlier; Client Security 9 and earlier; and various Anti-Virus products for Windows, Linux, and Citrix; does not properly detect malware in crafted (1) 7Z, (2) GZIP, (3) CAB, or (4) RAR archives, which makes it easier for remote attackers to avoid detection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-15T21:12:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1023841", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023841" }, { "name": "1023842", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023842" }, { "name": "1023843", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023843" }, { "name": "39396", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39396" }, { "name": "ADV-2010-0855", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0855" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1425", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "F-Secure Internet Security 2010 and earlier; Anti-Virus for Microsoft Exchange 9 and earlier, and for MIMEsweeper 5.61 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, and for Linux 4.02 and earlier; Anti-Virus 2010 and earlier; Home Server Security 2009; Protection Service for Consumers 9 and earlier, for Business - Workstation security 9 and earlier, for Business - Server Security 8 and earlier, and for E-mail and Server security 9 and earlier; Mac Protection build 8060 and earlier; Client Security 9 and earlier; and various Anti-Virus products for Windows, Linux, and Citrix; does not properly detect malware in crafted (1) 7Z, (2) GZIP, (3) CAB, or (4) RAR archives, which makes it easier for remote attackers to avoid detection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1023841", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023841" }, { "name": "1023842", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023842" }, { "name": "1023843", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023843" }, { "name": "39396", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39396" }, { "name": "ADV-2010-0855", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0855" }, { "name": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.html", "refsource": "CONFIRM", "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1425", "datePublished": "2010-04-15T21:12:00Z", "dateReserved": "2010-04-15T00:00:00Z", "dateUpdated": "2024-09-17T02:41:53.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33601 (GCVE-0-2021-33601)
Vulnerability from cvelistv5
Published
2021-09-28 09:08
Modified
2024-08-03 23:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Arbitrary Code Execution in Web Interface of F-Secure Internet Gatekeeper
Summary
A vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. An authenticated user can modify settings through the web user interface in a way that could lead to an arbitrary code execution on the F-Secure Internet Gatekeeper server.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure | F-Secure Internet Gatekeeper |
Version: 5 Series All Version |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.181Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33601" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "F-Secure Internet Gatekeeper", "vendor": "F-Secure", "versions": [ { "status": "affected", "version": "5 Series All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. An authenticated user can modify settings through the web user interface in a way that could lead to an arbitrary code execution on the F-Secure Internet Gatekeeper server." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary Code Execution in Web Interface of F-Secure Internet Gatekeeper", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-28T09:08:33", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33601" } ], "solutions": [ { "lang": "en", "value": "FIX: Hotfix 9 will be published to fix this vulnerability. Download and instructions available at: https://www.f-secure.com/en/business/downloads/internet-gatekeeper\n" } ], "source": { "discovery": "EXTERNAL" }, "title": "Arbitrary Code Execution in Web Interface of F-Secure Internet Gatekeeper", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-33601", "STATE": "PUBLIC", "TITLE": "Arbitrary Code Execution in Web Interface of F-Secure Internet Gatekeeper" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure Internet Gatekeeper", "version": { "version_data": [ { "version_affected": "=", "version_name": "5 Series", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. An authenticated user can modify settings through the web user interface in a way that could lead to an arbitrary code execution on the F-Secure Internet Gatekeeper server." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Arbitrary Code Execution in Web Interface of F-Secure Internet Gatekeeper" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33601", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33601" } ] }, "solution": [ { "lang": "en", "value": "FIX: Hotfix 9 will be published to fix this vulnerability. Download and instructions available at: https://www.f-secure.com/en/business/downloads/internet-gatekeeper\n" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2021-33601", "datePublished": "2021-09-28T09:08:33", "dateReserved": "2021-05-27T00:00:00", "dateUpdated": "2024-08-03T23:50:43.181Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0053 (GCVE-0-2004-0053)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use fields that use RFC2047 encoding, which may be interpreted differently by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:01:23.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-rfc2047-filtering-bypass(17331)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17331" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC2047 encoding issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109520704408739\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use fields that use RFC2047 encoding, which may be interpreted differently by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-rfc2047-filtering-bypass(17331)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17331" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC2047 encoding issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109520704408739\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use fields that use RFC2047 encoding, which may be interpreted differently by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-rfc2047-filtering-bypass(17331)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17331" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC2047 encoding issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109520704408739\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0053", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2004-01-14T00:00:00", "dateUpdated": "2024-08-08T00:01:23.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0162 (GCVE-0-2004-0162)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME encapsulation that uses RFC822 comment fields, which may be interpreted as other fields by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:10:03.544Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC822 comment issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517563513776\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-rfc822-filtering-bypass(17332)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17332" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME encapsulation that uses RFC822 comment fields, which may be interpreted as other fields by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC822 comment issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517563513776\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-rfc822-filtering-bypass(17332)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17332" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0162", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME encapsulation that uses RFC822 comment fields, which may be interpreted as other fields by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC822 comment issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109517563513776\u0026w=2" }, { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-rfc822-filtering-bypass(17332)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17332" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0162", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2004-02-18T00:00:00", "dateUpdated": "2024-08-08T00:10:03.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-40836 (GCVE-0-2021-40836)
Vulnerability from cvelistv5
Published
2021-12-22 11:14
Modified
2024-08-04 02:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service Vulnerability
Summary
A vulnerability affecting F-Secure antivirus engine was discovered whereby scanning MS outlook .pst files can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure | F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit) F-Secure Linux Security 64 F-Secure Atlant & F-Secure Internet Gatekeeper |
Version: All Version |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:51:07.487Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit) F-Secure Linux Security 64 F-Secure Atlant \u0026 F-Secure Internet Gatekeeper", "vendor": "F-Secure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability affecting F-Secure antivirus engine was discovered whereby scanning MS outlook .pst files can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-22T18:07:19", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn update 2021-12-13_07" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-40836", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit) F-Secure Linux Security 64 F-Secure Atlant \u0026 F-Secure Internet Gatekeeper", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability affecting F-Secure antivirus engine was discovered whereby scanning MS outlook .pst files can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ] }, "solution": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn update 2021-12-13_07" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2021-40836", "datePublished": "2021-12-22T11:14:42", "dateReserved": "2021-09-09T00:00:00", "dateUpdated": "2024-08-04T02:51:07.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28881 (GCVE-0-2022-28881)
Vulnerability from cvelistv5
Published
2022-08-10 16:03
Modified
2024-08-03 06:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service Vulnerability
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the aerdl.dll component used in certain WithSecure products unpacker function crashes which leads to scanning engine crash. The exploit can be triggered remotely by an attacker.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure and WithSecure | All F-Secure and WithSecure Endpoint Protection products for Windows & Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection |
Version: All Version |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.155Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "All F-Secure and WithSecure Endpoint Protection products for Windows \u0026 Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection", "vendor": "F-Secure and WithSecure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the aerdl.dll component used in certain WithSecure products unpacker function crashes which leads to scanning engine crash. The exploit can be triggered remotely by an attacker." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-10T16:03:24", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-07-29_13" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2022-28881", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "All F-Secure and WithSecure Endpoint Protection products for Windows \u0026 Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure and WithSecure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the aerdl.dll component used in certain WithSecure products unpacker function crashes which leads to scanning engine crash. The exploit can be triggered remotely by an attacker." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "name": "https://www.withsecure.com/en/support/security-advisories", "refsource": "MISC", "url": "https://www.withsecure.com/en/support/security-advisories" } ] }, "solution": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-07-29_13" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28881", "datePublished": "2022-08-10T16:03:24", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-03T06:03:53.155Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-2838 (GCVE-0-2006-2838)
Vulnerability from cvelistv5
Published
2006-06-06 20:03
Modified
2024-08-07 18:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the web console in F-Secure Anti-Virus for Microsoft Exchange 6.40, and Internet Gatekeeper 6.40 through 6.42 and 6.50 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors. NOTE: By default, the connections are only allowed from the local host.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:06:26.855Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1016197", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016197" }, { "name": "1016196", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016196" }, { "name": "ADV-2006-2076", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2076" }, { "name": "fsecure-webconsole-bo(26799)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26799" }, { "name": "20407", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20407" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/security/fsc-2006-3.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-06-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the web console in F-Secure Anti-Virus for Microsoft Exchange 6.40, and Internet Gatekeeper 6.40 through 6.42 and 6.50 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors. NOTE: By default, the connections are only allowed from the local host." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1016197", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016197" }, { "name": "1016196", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016196" }, { "name": "ADV-2006-2076", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2076" }, { "name": "fsecure-webconsole-bo(26799)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26799" }, { "name": "20407", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20407" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/security/fsc-2006-3.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-2838", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the web console in F-Secure Anti-Virus for Microsoft Exchange 6.40, and Internet Gatekeeper 6.40 through 6.42 and 6.50 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors. NOTE: By default, the connections are only allowed from the local host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1016197", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016197" }, { "name": "1016196", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016196" }, { "name": "ADV-2006-2076", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2076" }, { "name": "fsecure-webconsole-bo(26799)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26799" }, { "name": "20407", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20407" }, { "name": "http://www.f-secure.com/security/fsc-2006-3.shtml", "refsource": "CONFIRM", "url": "http://www.f-secure.com/security/fsc-2006-3.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-2838", "datePublished": "2006-06-06T20:03:00", "dateReserved": "2006-06-05T00:00:00", "dateUpdated": "2024-08-07T18:06:26.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1015 (GCVE-0-2003-1015)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 02:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use whitespace in an unusual fashion, which may be interpreted differently by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:12:35.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field whitespace issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109525252118936\u0026w=2" }, { "name": "mime-tools-incorrect-concatenation(9273)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9273" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use whitespace in an unusual fashion, which may be interpreted differently by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field whitespace issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109525252118936\u0026w=2" }, { "name": "mime-tools-incorrect-concatenation(9273)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9273" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1015", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use whitespace in an unusual fashion, which may be interpreted differently by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field whitespace issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109525252118936\u0026w=2" }, { "name": "mime-tools-incorrect-concatenation(9273)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9273" }, { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1015", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2003-12-17T00:00:00", "dateUpdated": "2024-08-08T02:12:35.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0234 (GCVE-0-2004-0234)
Vulnerability from cvelistv5
Published
2004-05-05 04:00
Modified
2024-08-08 00:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:10:03.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1015866", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015866" }, { "name": "CLA-2004:840", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "name": "5753", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5753" }, { "name": "oval:org.mitre.oval:def:977", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977" }, { "name": "FEDORA-2004-119", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "name": "20060403 Barracuda LHA archiver security bug leads to remote compromise", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html" }, { "name": "10243", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10243" }, { "name": "ADV-2006-1220", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1220" }, { "name": "20040501 LHa buffer overflows and directory traversal problems", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "name": "19514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19514" }, { "name": "5754", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5754" }, { "name": "RHSA-2004:179", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt" }, { "name": "FLSA:1833", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "name": "DSA-515", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-515" }, { "name": "oval:org.mitre.oval:def:9881", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881" }, { "name": "20040510 [Ulf Harnhammar]: LHA Advisory + Patch", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "name": "GLSA-200405-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "name": "RHSA-2004:178", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "name": "lha-multiple-bo(16012)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16012" }, { "name": "20040502 Lha local stack overflow Proof Of Concept Code", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1015866", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015866" }, { "name": "CLA-2004:840", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "name": "5753", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5753" }, { "name": "oval:org.mitre.oval:def:977", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977" }, { "name": "FEDORA-2004-119", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "name": "20060403 Barracuda LHA archiver security bug leads to remote compromise", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html" }, { "name": "10243", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10243" }, { "name": "ADV-2006-1220", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1220" }, { "name": "20040501 LHa buffer overflows and directory traversal problems", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "name": "19514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19514" }, { "name": "5754", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5754" }, { "name": "RHSA-2004:179", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt" }, { "name": "FLSA:1833", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "name": "DSA-515", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-515" }, { "name": "oval:org.mitre.oval:def:9881", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881" }, { "name": "20040510 [Ulf Harnhammar]: LHA Advisory + Patch", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "name": "GLSA-200405-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "name": "RHSA-2004:178", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "name": "lha-multiple-bo(16012)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16012" }, { "name": "20040502 Lha local stack overflow Proof Of Concept Code", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0234", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1015866", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015866" }, { "name": "CLA-2004:840", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "name": "5753", "refsource": "OSVDB", "url": "http://www.osvdb.org/5753" }, { "name": "oval:org.mitre.oval:def:977", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977" }, { "name": "FEDORA-2004-119", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "name": "20060403 Barracuda LHA archiver security bug leads to remote compromise", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html" }, { "name": "10243", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10243" }, { "name": "ADV-2006-1220", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1220" }, { "name": "20040501 LHa buffer overflows and directory traversal problems", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "name": "19514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19514" }, { "name": "5754", "refsource": "OSVDB", "url": "http://www.osvdb.org/5754" }, { "name": "RHSA-2004:179", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "name": "http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt", "refsource": "MISC", "url": "http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt" }, { "name": "FLSA:1833", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "name": "DSA-515", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-515" }, { "name": "oval:org.mitre.oval:def:9881", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881" }, { "name": "20040510 [Ulf Harnhammar]: LHA Advisory + Patch", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "name": "GLSA-200405-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "name": "RHSA-2004:178", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "name": "lha-multiple-bo(16012)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16012" }, { "name": "20040502 Lha local stack overflow Proof Of Concept Code", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0234", "datePublished": "2004-05-05T04:00:00", "dateReserved": "2004-03-17T00:00:00", "dateUpdated": "2024-08-08T00:10:03.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0453 (GCVE-0-2011-0453)
Vulnerability from cvelistv5
Published
2011-02-18 16:00
Modified
2024-08-06 21:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
F-Secure Internet Gatekeeper for Linux 3.x before 3.03 does not require authentication for reading access logs, which allows remote attackers to obtain potentially sensitive information via a TCP session on the admin UI port.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.753Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "43326", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43326" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2011-1.html" }, { "name": "ADV-2011-0393", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0393" }, { "name": "70898", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/70898" }, { "name": "JVNDB-2011-000013", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000013" }, { "name": "JVN#71542734", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN71542734/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-15T00:00:00", "descriptions": [ { "lang": "en", "value": "F-Secure Internet Gatekeeper for Linux 3.x before 3.03 does not require authentication for reading access logs, which allows remote attackers to obtain potentially sensitive information via a TCP session on the admin UI port." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-23T10:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "43326", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43326" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2011-1.html" }, { "name": "ADV-2011-0393", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0393" }, { "name": "70898", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/70898" }, { "name": "JVNDB-2011-000013", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000013" }, { "name": "JVN#71542734", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN71542734/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2011-0453", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "F-Secure Internet Gatekeeper for Linux 3.x before 3.03 does not require authentication for reading access logs, which allows remote attackers to obtain potentially sensitive information via a TCP session on the admin UI port." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "43326", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43326" }, { "name": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2011-1.html", "refsource": "CONFIRM", "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2011-1.html" }, { "name": "ADV-2011-0393", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0393" }, { "name": "70898", "refsource": "OSVDB", "url": "http://osvdb.org/70898" }, { "name": "JVNDB-2011-000013", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000013" }, { "name": "JVN#71542734", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN71542734/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2011-0453", "datePublished": "2011-02-18T16:00:00", "dateReserved": "2011-01-14T00:00:00", "dateUpdated": "2024-08-06T21:51:08.753Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-40833 (GCVE-0-2021-40833)
Vulnerability from cvelistv5
Published
2021-11-26 16:39
Modified
2024-08-04 02:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service Vulnerability
Summary
A vulnerability affecting F-Secure antivirus engine was discovered whereby unpacking UPX file can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure | F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit) F-Secure Linux Security 64 F-Secure Internet Gatekeeper & F-Secure Atlant |
Version: All Version |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:51:07.454Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40833" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit) F-Secure Linux Security 64 F-Secure Internet Gatekeeper \u0026 F-Secure Atlant", "vendor": "F-Secure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability affecting F-Secure antivirus engine was discovered whereby unpacking UPX file can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-26T16:39:54", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40833" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn update 2021-11-22_03" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-40833", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit) F-Secure Linux Security 64 F-Secure Internet Gatekeeper \u0026 F-Secure Atlant", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability affecting F-Secure antivirus engine was discovered whereby unpacking UPX file can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40833", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40833" } ] }, "solution": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn update 2021-11-22_03" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2021-40833", "datePublished": "2021-11-26T16:39:54", "dateReserved": "2021-09-09T00:00:00", "dateUpdated": "2024-08-04T02:51:07.454Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28886 (GCVE-0-2022-28886)
Vulnerability from cvelistv5
Published
2022-09-23 18:24
Modified
2025-05-22 18:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service Vulnerability
Summary
A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.so/aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure and WithSecure | All F-Secure and WithSecure Endpoint Protection products for Windows running 32 bit operating system. F-Secure Linux Security 32 F-Secure Internet Gatekeeper |
Version: All Version |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:10:56.780Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-28886", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-22T15:34:58.964193Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "CWE-835 Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-22T18:15:13.487Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "All F-Secure and WithSecure Endpoint Protection products for Windows running 32 bit operating system. F-Secure Linux Security 32 F-Secure Internet Gatekeeper", "vendor": "F-Secure and WithSecure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.so/aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-23T18:24:04.000Z", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-09-13_07" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2022-28886", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "All F-Secure and WithSecure Endpoint Protection products for Windows running 32 bit operating system. F-Secure Linux Security 32 F-Secure Internet Gatekeeper", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure and WithSecure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.so/aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "name": "https://www.withsecure.com/en/support/security-advisories", "refsource": "MISC", "url": "https://www.withsecure.com/en/support/security-advisories" } ] }, "solution": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-09-13_07" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28886", "datePublished": "2022-09-23T18:24:04.000Z", "dateReserved": "2022-04-08T00:00:00.000Z", "dateUpdated": "2025-05-22T18:15:13.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3468 (GCVE-0-2005-3468)
Vulnerability from cvelistv5
Published
2005-11-02 23:00
Modified
2024-08-07 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory traversal vulnerability in F-Secure Anti-Virus for Microsoft Exchange 6.40 and Internet Gatekeeper 6.40 to 6.42 allows limited remote attackers to bypass Web Console authentication and read files.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:10:08.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1015143", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015143" }, { "name": "1015142", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015142" }, { "name": "15284", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15284" }, { "name": "17361", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/security/fsc-2005-2.shtml" }, { "name": "ADV-2005-2277", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2277" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-11-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in F-Secure Anti-Virus for Microsoft Exchange 6.40 and Internet Gatekeeper 6.40 to 6.42 allows limited remote attackers to bypass Web Console authentication and read files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-12-20T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1015143", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015143" }, { "name": "1015142", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015142" }, { "name": "15284", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15284" }, { "name": "17361", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/security/fsc-2005-2.shtml" }, { "name": "ADV-2005-2277", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2277" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3468", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in F-Secure Anti-Virus for Microsoft Exchange 6.40 and Internet Gatekeeper 6.40 to 6.42 allows limited remote attackers to bypass Web Console authentication and read files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1015143", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015143" }, { "name": "1015142", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015142" }, { "name": "15284", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15284" }, { "name": "17361", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17361" }, { "name": "http://www.f-secure.com/security/fsc-2005-2.shtml", "refsource": "CONFIRM", "url": "http://www.f-secure.com/security/fsc-2005-2.shtml" }, { "name": "ADV-2005-2277", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2277" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3468", "datePublished": "2005-11-02T23:00:00", "dateReserved": "2005-11-02T00:00:00", "dateUpdated": "2024-08-07T23:10:08.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-2405 (GCVE-0-2004-2405)
Vulnerability from cvelistv5
Published
2005-08-18 04:00
Modified
2024-08-08 01:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in multiple F-Secure Anti-Virus products, including F-Secure Anti-Virus 5.42 and earlier, allows remote attackers to bypass scanning or cause a denial of service (crash or module restart), depending on the product, via a malformed LHA archive.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:29:12.545Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/security/fsc-2004-1.shtml" }, { "name": "11712", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11712" }, { "name": "fsecure-lha-archive-bo(16258)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16258" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-05-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in multiple F-Secure Anti-Virus products, including F-Secure Anti-Virus 5.42 and earlier, allows remote attackers to bypass scanning or cause a denial of service (crash or module restart), depending on the product, via a malformed LHA archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/security/fsc-2004-1.shtml" }, { "name": "11712", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11712" }, { "name": "fsecure-lha-archive-bo(16258)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16258" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2405", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in multiple F-Secure Anti-Virus products, including F-Secure Anti-Virus 5.42 and earlier, allows remote attackers to bypass scanning or cause a denial of service (crash or module restart), depending on the product, via a malformed LHA archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.f-secure.com/security/fsc-2004-1.shtml", "refsource": "CONFIRM", "url": "http://www.f-secure.com/security/fsc-2004-1.shtml" }, { "name": "11712", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11712" }, { "name": "fsecure-lha-archive-bo(16258)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16258" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2405", "datePublished": "2005-08-18T04:00:00", "dateReserved": "2005-08-18T00:00:00", "dateUpdated": "2024-08-08T01:29:12.545Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33602 (GCVE-0-2021-33602)
Vulnerability from cvelistv5
Published
2021-10-06 09:59
Modified
2024-08-03 23:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service Vulnerability
Summary
A vulnerability affecting the F-Secure Antivirus engine was discovered when the engine tries to unpack a zip archive (LZW decompression method), and this can crash the scanning engine. The vulnerability can be exploited remotely by an attacker. A successful attack will result in Denial-of-Service of the Anti-Virus engine.
References
► | URL | Tags |
---|---|---|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.182Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit) F-Secure Linux Security 64 F-Secure Atlant \u0026 F-Secure Cloud Protection for Salesforce", "vendor": "F-Secure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability affecting the F-Secure Antivirus engine was discovered when the engine tries to unpack a zip archive (LZW decompression method), and this can crash the scanning engine. The vulnerability can be exploited remotely by an attacker. A successful attack will result in Denial-of-Service of the Anti-Virus engine." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-06T09:59:21", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through the automatic update channel with Capricorn update 2021-09-29_03" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability ", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-33602", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability " }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit) F-Secure Linux Security 64 F-Secure Atlant \u0026 F-Secure Cloud Protection for Salesforce", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability affecting the F-Secure Antivirus engine was discovered when the engine tries to unpack a zip archive (LZW decompression method), and this can crash the scanning engine. The vulnerability can be exploited remotely by an attacker. A successful attack will result in Denial-of-Service of the Anti-Virus engine." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ] }, "solution": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through the automatic update channel with Capricorn update 2021-09-29_03" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2021-33602", "datePublished": "2021-10-06T09:59:21", "dateReserved": "2021-05-27T00:00:00", "dateUpdated": "2024-08-03T23:50:43.182Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0051 (GCVE-0-2004-0051)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:01:23.610Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME Content-Transfer-Encoding mechanism issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517788100063\u0026w=2" }, { "name": "mime-contenttransfer-filter-bypass(17337)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17337" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME Content-Transfer-Encoding mechanism issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517788100063\u0026w=2" }, { "name": "mime-contenttransfer-filter-bypass(17337)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17337" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME Content-Transfer-Encoding mechanism issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109517788100063\u0026w=2" }, { "name": "mime-contenttransfer-filter-bypass(17337)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17337" }, { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0051", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2004-01-14T00:00:00", "dateUpdated": "2024-08-08T00:01:23.610Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-44747 (GCVE-0-2021-44747)
Vulnerability from cvelistv5
Published
2022-03-01 11:55
Modified
2024-08-04 04:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service Vulnerability
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Linux Security whereby the Fmlib component used in certain F-Secure products can crash while scanning fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service of the Anti-Virus engine.
References
► | URL | Tags |
---|---|---|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:32:13.027Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "F-Secure endpoint protection products on Mac, F-Secure Linux Security (32-bit), F-Secure Linux Security 64, F-Secure Atlant, F-Secure Internet Gatekeeper \u0026 F-Secure Security Cloud", "vendor": "F-Secure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Linux Security whereby the Fmlib component used in certain F-Secure products can crash while scanning fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service of the Anti-Virus engine." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-04T15:47:23", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ], "solutions": [ { "lang": "en", "value": "FIX: No user action is required. The required fix has been published through automatic update channel with Pisces release 2022-02-23_01" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-44747", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure endpoint protection products on Mac, F-Secure Linux Security (32-bit), F-Secure Linux Security 64, F-Secure Atlant, F-Secure Internet Gatekeeper \u0026 F-Secure Security Cloud", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Linux Security whereby the Fmlib component used in certain F-Secure products can crash while scanning fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service of the Anti-Virus engine." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ] }, "solution": [ { "lang": "en", "value": "FIX: No user action is required. The required fix has been published through automatic update channel with Pisces release 2022-02-23_01" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2021-44747", "datePublished": "2022-03-01T11:55:26", "dateReserved": "2021-12-08T00:00:00", "dateUpdated": "2024-08-04T04:32:13.027Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28882 (GCVE-0-2022-28882)
Vulnerability from cvelistv5
Published
2022-08-23 15:54
Modified
2024-08-03 06:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service Vulnerability
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aegen.dll will go into an infinite loop when unpacking PE files. This eventually leads to scanning engine crash. The exploit can be triggered remotely by an attacker.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure and WithSecure | All F-Secure and WithSecure Endpoint Protection products for Windows & Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection |
Version: All Version |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "All F-Secure and WithSecure Endpoint Protection products for Windows \u0026 Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection", "vendor": "F-Secure and WithSecure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "credits": [ { "lang": "en", "value": "WithSecure \u0026 F-Secure would like to thank faty420 https://twitter.com/faty420 for bringing this issue to our attention" } ], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure \u0026 WithSecure products whereby the aegen.dll will go into an infinite loop when unpacking PE files. This eventually leads to scanning engine crash. The exploit can be triggered remotely by an attacker." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-23T15:54:02", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-08-10_06" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2022-28882", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "All F-Secure and WithSecure Endpoint Protection products for Windows \u0026 Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure and WithSecure" } ] } }, "credit": [ { "lang": "eng", "value": "WithSecure \u0026 F-Secure would like to thank faty420 https://twitter.com/faty420 for bringing this issue to our attention" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure \u0026 WithSecure products whereby the aegen.dll will go into an infinite loop when unpacking PE files. This eventually leads to scanning engine crash. The exploit can be triggered remotely by an attacker." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.withsecure.com/en/support/security-advisories", "refsource": "MISC", "url": "https://www.withsecure.com/en/support/security-advisories" } ] }, "solution": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-08-10_06" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28882", "datePublished": "2022-08-23T15:54:02", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-03T06:03:53.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0161 (GCVE-0-2004-0161)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use RFC2231 encoding, which may be interpreted differently by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:10:03.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC2231 encoding issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109524928232568\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-tools-parameter-encoding(9274)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9274" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use RFC2231 encoding, which may be interpreted differently by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC2231 encoding issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109524928232568\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-tools-parameter-encoding(9274)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9274" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0161", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use RFC2231 encoding, which may be interpreted differently by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC2231 encoding issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109524928232568\u0026w=2" }, { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-tools-parameter-encoding(9274)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9274" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0161", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2004-02-18T00:00:00", "dateUpdated": "2024-08-08T00:10:03.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0830 (GCVE-0-2004-0830)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Content Scanner Server in F-Secure Anti-Virus for Microsoft Exchange 6.21 and earlier, F-Secure Anti-Virus for Microsoft Exchange 6.01 and earlier, and F-Secure Internet Gatekeeper 6.32 and earlier allow remote attackers to cause a denial of service (service crash due to unhandled exception) via a certain malformed packet.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:47.923Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040910 F-Secure Internet Gatekeeper Content Scanning Server Denial of Service Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109483205925698\u0026w=2" }, { "name": "20040909 F-Secure Internet Gatekeeper Content Scanning Server Denial of Service Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=137\u0026type=vulnerabilities" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/security/fsc-2004-2.shtml" }, { "name": "11145", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11145" }, { "name": "fsecure-content-scanner-dos(17307)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17307" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The Content Scanner Server in F-Secure Anti-Virus for Microsoft Exchange 6.21 and earlier, F-Secure Anti-Virus for Microsoft Exchange 6.01 and earlier, and F-Secure Internet Gatekeeper 6.32 and earlier allow remote attackers to cause a denial of service (service crash due to unhandled exception) via a certain malformed packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040910 F-Secure Internet Gatekeeper Content Scanning Server Denial of Service Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109483205925698\u0026w=2" }, { "name": "20040909 F-Secure Internet Gatekeeper Content Scanning Server Denial of Service Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=137\u0026type=vulnerabilities" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/security/fsc-2004-2.shtml" }, { "name": "11145", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11145" }, { "name": "fsecure-content-scanner-dos(17307)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17307" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0830", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Content Scanner Server in F-Secure Anti-Virus for Microsoft Exchange 6.21 and earlier, F-Secure Anti-Virus for Microsoft Exchange 6.01 and earlier, and F-Secure Internet Gatekeeper 6.32 and earlier allow remote attackers to cause a denial of service (service crash due to unhandled exception) via a certain malformed packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040910 F-Secure Internet Gatekeeper Content Scanning Server Denial of Service Vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109483205925698\u0026w=2" }, { "name": "20040909 F-Secure Internet Gatekeeper Content Scanning Server Denial of Service Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=137\u0026type=vulnerabilities" }, { "name": "http://www.f-secure.com/security/fsc-2004-2.shtml", "refsource": "CONFIRM", "url": "http://www.f-secure.com/security/fsc-2004-2.shtml" }, { "name": "11145", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11145" }, { "name": "fsecure-content-scanner-dos(17307)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17307" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0830", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2004-09-07T00:00:00", "dateUpdated": "2024-08-08T00:31:47.923Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28879 (GCVE-0-2022-28879)
Vulnerability from cvelistv5
Published
2022-07-22 15:27
Modified
2024-08-03 06:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial-of-Service (DoS) Vulnerability
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aepack.dll component can crash the scanning engine.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure | All F-Secure and WithSecure Endpoint Protection products for Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection |
Version: All Version |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.213Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "All F-Secure and WithSecure Endpoint Protection products for Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection", "vendor": "F-Secure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aepack.dll component can crash the scanning engine." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-Service (DoS) Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-22T15:27:34", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-07-11_07" } ], "source": { "discovery": "UNKNOWN" }, "title": "Denial-of-Service (DoS) Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2022-28879", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "All F-Secure and WithSecure Endpoint Protection products for Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aepack.dll component can crash the scanning engine." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-Service (DoS) Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "name": "https://www.withsecure.com/en/support/security-advisories", "refsource": "MISC", "url": "https://www.withsecure.com/en/support/security-advisories" } ] }, "solution": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-07-11_07" } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28879", "datePublished": "2022-07-22T15:27:34", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-03T06:03:53.213Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0235 (GCVE-0-2004-0235)
Vulnerability from cvelistv5
Published
2004-05-05 04:00
Modified
2024-08-08 00:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes ("//absolute/path").
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:10:03.724Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "CLA-2004:840", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "name": "FEDORA-2004-119", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "name": "10243", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10243" }, { "name": "20040501 LHa buffer overflows and directory traversal problems", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "name": "lha-directory-traversal(16013)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16013" }, { "name": "RHSA-2004:179", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "name": "FLSA:1833", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "name": "DSA-515", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-515" }, { "name": "20040510 [Ulf Harnhammar]: LHA Advisory + Patch", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "name": "GLSA-200405-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "name": "RHSA-2004:178", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "name": "oval:org.mitre.oval:def:978", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978" }, { "name": "oval:org.mitre.oval:def:10409", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10409" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes (\"//absolute/path\")." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "CLA-2004:840", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "name": "FEDORA-2004-119", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "name": "10243", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10243" }, { "name": "20040501 LHa buffer overflows and directory traversal problems", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "name": "lha-directory-traversal(16013)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16013" }, { "name": "RHSA-2004:179", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "name": "FLSA:1833", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "name": "DSA-515", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-515" }, { "name": "20040510 [Ulf Harnhammar]: LHA Advisory + Patch", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "name": "GLSA-200405-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "name": "RHSA-2004:178", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "name": "oval:org.mitre.oval:def:978", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978" }, { "name": "oval:org.mitre.oval:def:10409", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10409" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0235", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes (\"//absolute/path\")." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "CLA-2004:840", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "name": "FEDORA-2004-119", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "name": "10243", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10243" }, { "name": "20040501 LHa buffer overflows and directory traversal problems", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "name": "lha-directory-traversal(16013)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16013" }, { "name": "RHSA-2004:179", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "name": "FLSA:1833", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "name": "DSA-515", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-515" }, { "name": "20040510 [Ulf Harnhammar]: LHA Advisory + Patch", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "name": "GLSA-200405-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "name": "RHSA-2004:178", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "name": "oval:org.mitre.oval:def:978", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978" }, { "name": "oval:org.mitre.oval:def:10409", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10409" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0235", "datePublished": "2004-05-05T04:00:00", "dateReserved": "2004-03-17T00:00:00", "dateUpdated": "2024-08-08T00:10:03.724Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-0337 (GCVE-0-2006-0337)
Vulnerability from cvelistv5
Published
2006-01-21 00:00
Modified
2024-08-07 16:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allows remote attackers to execute arbitrary code via crafted ZIP archives.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:34:14.410Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/security/fsc-2006-1.shtml" }, { "name": "1015510", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015510" }, { "name": "18529", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18529" }, { "name": "22632", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/22632" }, { "name": "fsecure-zip-bo(24198)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24198" }, { "name": "1015509", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015509" }, { "name": "16309", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16309" }, { "name": "Q-103", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/q-103.shtml" }, { "name": "1015508", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015508" }, { "name": "1015507", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015507" }, { "name": "ADV-2006-0257", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0257" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-01-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allows remote attackers to execute arbitrary code via crafted ZIP archives." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/security/fsc-2006-1.shtml" }, { "name": "1015510", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015510" }, { "name": "18529", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18529" }, { "name": "22632", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/22632" }, { "name": "fsecure-zip-bo(24198)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24198" }, { "name": "1015509", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015509" }, { "name": "16309", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16309" }, { "name": "Q-103", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/q-103.shtml" }, { "name": "1015508", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015508" }, { "name": "1015507", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015507" }, { "name": "ADV-2006-0257", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0257" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0337", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allows remote attackers to execute arbitrary code via crafted ZIP archives." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.f-secure.com/security/fsc-2006-1.shtml", "refsource": "CONFIRM", "url": "http://www.f-secure.com/security/fsc-2006-1.shtml" }, { "name": "1015510", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015510" }, { "name": "18529", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18529" }, { "name": "22632", "refsource": "OSVDB", "url": "http://www.osvdb.org/22632" }, { "name": "fsecure-zip-bo(24198)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24198" }, { "name": "1015509", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015509" }, { "name": "16309", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16309" }, { "name": "Q-103", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/q-103.shtml" }, { "name": "1015508", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015508" }, { "name": "1015507", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015507" }, { "name": "ADV-2006-0257", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0257" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0337", "datePublished": "2006-01-21T00:00:00", "dateReserved": "2006-01-20T00:00:00", "dateUpdated": "2024-08-07T16:34:14.410Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28884 (GCVE-0-2022-28884)
Vulnerability from cvelistv5
Published
2022-09-06 17:19
Modified
2024-08-03 06:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service Vulnerability
Summary
A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure and WithSecure | All F-Secure and WithSecure Endpoint Protection products for Windows and Mac running 32 bit operating system. F-Secure Linux Security 32 F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection |
Version: All Version |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.withsecure.com/en/support/security-advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.withsecure.com/en/expertise/people" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "All F-Secure and WithSecure Endpoint Protection products for Windows and Mac running 32 bit operating system. F-Secure Linux Security 32 F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection", "vendor": "F-Secure and WithSecure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-06T17:19:03", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.withsecure.com/en/support/security-advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.withsecure.com/en/expertise/people" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-08-25_6" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2022-28884", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "All F-Secure and WithSecure Endpoint Protection products for Windows and Mac running 32 bit operating system. F-Secure Linux Security 32 F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure and WithSecure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.withsecure.com/en/support/security-advisories", "refsource": "MISC", "url": "https://www.withsecure.com/en/support/security-advisories" }, { "name": "https://www.withsecure.com/en/expertise/people", "refsource": "MISC", "url": "https://www.withsecure.com/en/expertise/people" } ] }, "solution": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-08-25_6" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28884", "datePublished": "2022-09-06T17:19:04", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-03T06:03:53.214Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-40837 (GCVE-0-2021-40837)
Vulnerability from cvelistv5
Published
2022-02-09 12:10
Modified
2024-08-04 02:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service Vulnerability
Summary
A vulnerability affecting F-Secure antivirus engine before Capricorn update 2022-02-01_01 was discovered whereby decompression of ACE file causes the scanner service to stop. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine.
References
► | URL | Tags |
---|---|---|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:51:07.508Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40837" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit), F-Secure Linux Security 64, F-Secure Atlant, F-Secure Internet Gatekeeper \u0026 F-Secure Security Cloud", "vendor": "F-Secure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability affecting F-Secure antivirus engine before Capricorn update 2022-02-01_01 was discovered whereby decompression of ACE file causes the scanner service to stop. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T12:10:46", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40837" } ], "solutions": [ { "lang": "en", "value": "FIX: No User action is required. The required fix has been published through automatic update channel with Capricorn update 2022-02-01_01" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-40837", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit), F-Secure Linux Security 64, F-Secure Atlant, F-Secure Internet Gatekeeper \u0026 F-Secure Security Cloud", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability affecting F-Secure antivirus engine before Capricorn update 2022-02-01_01 was discovered whereby decompression of ACE file causes the scanner service to stop. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40837", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40837" } ] }, "solution": [ { "lang": "en", "value": "FIX: No User action is required. The required fix has been published through automatic update channel with Capricorn update 2022-02-01_01" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2021-40837", "datePublished": "2022-02-09T12:10:46", "dateReserved": "2021-09-09T00:00:00", "dateUpdated": "2024-08-04T02:51:07.508Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1014 (GCVE-0-2003-1014)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 02:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use multiple MIME fields with the same name, which may be interpreted differently by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:12:35.312Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field multiple occurrence issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517732328759\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-field-filtering-bypass(17333)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17333" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use multiple MIME fields with the same name, which may be interpreted differently by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field multiple occurrence issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517732328759\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-field-filtering-bypass(17333)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17333" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1014", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use multiple MIME fields with the same name, which may be interpreted differently by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field multiple occurrence issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109517732328759\u0026w=2" }, { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-field-filtering-bypass(17333)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17333" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1014", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2003-12-17T00:00:00", "dateUpdated": "2024-08-08T02:12:35.312Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28876 (GCVE-0-2022-28876)
Vulnerability from cvelistv5
Published
2022-07-14 14:45
Modified
2024-08-03 06:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial-of-Service (DoS) Vulnerability
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aeheur.dll component can crash the scanning engine. The exploit can be triggered remotely by an attacker.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.142Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "All F-Secure \u0026 WithSecure endpoint protection products for Windows and Mac. F-Secure Linux Security (32-bit). F-Secure Linux Security (64-bit). F-Secure Atlant. WithSecure Cloud Protection for Salesforce \u0026 WithSecure Collaboration Protection", "vendor": "F-Secure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aeheur.dll component can crash the scanning engine. The exploit can be triggered remotely by an attacker." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-Service (DoS) Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-14T14:45:07", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-07-04_09" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability ", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2022-28876", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability " }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "All F-Secure \u0026 WithSecure endpoint protection products for Windows and Mac. F-Secure Linux Security (32-bit). F-Secure Linux Security (64-bit). F-Secure Atlant. WithSecure Cloud Protection for Salesforce \u0026 WithSecure Collaboration Protection", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aeheur.dll component can crash the scanning engine. The exploit can be triggered remotely by an attacker." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-Service (DoS) Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "name": "https://www.withsecure.com/en/support/security-advisories", "refsource": "MISC", "url": "https://www.withsecure.com/en/support/security-advisories" } ] }, "solution": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-07-04_09" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28876", "datePublished": "2022-07-14T14:45:07", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-03T06:03:53.142Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-40832 (GCVE-0-2021-40832)
Vulnerability from cvelistv5
Published
2021-10-08 09:45
Modified
2024-08-04 02:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service Vulnerability
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the AVRDL unpacking module component used in certain F-Secure products can crash while scanning a fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service (DoS) of the Anti-Virus engine.
References
► | URL | Tags |
---|---|---|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:51:07.506Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40832" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit) F-Secure Linux Security 64 F-Secure Atlant F-Secure Cloud Protection for Salesforce and Cloud Protection for Microsoft Office 365", "vendor": "F-Secure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the AVRDL unpacking module component used in certain F-Secure products can crash while scanning a fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service (DoS) of the Anti-Virus engine." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-08T09:45:34", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40832" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn update 2021-09-29_03" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-40832", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure endpoint protection products on Windows and Mac. F-Secure Linux Security (32-bit) F-Secure Linux Security 64 F-Secure Atlant F-Secure Cloud Protection for Salesforce and Cloud Protection for Microsoft Office 365", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the AVRDL unpacking module component used in certain F-Secure products can crash while scanning a fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service (DoS) of the Anti-Virus engine." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40832", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40832" } ] }, "solution": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn update 2021-09-29_03" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2021-40832", "datePublished": "2021-10-08T09:45:34", "dateReserved": "2021-09-09T00:00:00", "dateUpdated": "2024-08-04T02:51:07.506Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3546 (GCVE-0-2005-3546)
Vulnerability from cvelistv5
Published
2005-11-16 07:37
Modified
2024-08-07 23:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
suid.cgi scripts in F-Secure (1) Internet Gatekeeper for Linux before 2.15.484 and (2) Anti-Virus Linux Gateway before 2.16 are installed SUID with world-executable permissions, which allows local users to gain privilege.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:17:23.308Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1015160", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015160" }, { "name": "20546", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20546" }, { "name": "20543", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20543" }, { "name": "20538", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20538" }, { "name": "20540", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20540" }, { "name": "20549", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20549" }, { "name": "17467", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17467" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/security/fsc-2005-3.shtml" }, { "name": "20544", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20544" }, { "name": "20547", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20547" }, { "name": "ADV-2005-2331", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2331" }, { "name": "20550", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20550" }, { "name": "20541", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20541" }, { "name": "20551", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20551" }, { "name": "20537", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20537" }, { "name": "1015159", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015159" }, { "name": "20545", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20545" }, { "name": "20513", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20513" }, { "name": "20552", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20552" }, { "name": "fsecure-scripts-root-privileges(22966)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22966" }, { "name": "20539", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20539" }, { "name": "20548", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20548" }, { "name": "15339", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15339" }, { "name": "20542", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20542" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-11-07T00:00:00", "descriptions": [ { "lang": "en", "value": "suid.cgi scripts in F-Secure (1) Internet Gatekeeper for Linux before 2.15.484 and (2) Anti-Virus Linux Gateway before 2.16 are installed SUID with world-executable permissions, which allows local users to gain privilege." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1015160", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015160" }, { "name": "20546", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20546" }, { "name": "20543", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20543" }, { "name": "20538", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20538" }, { "name": "20540", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20540" }, { "name": "20549", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20549" }, { "name": "17467", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17467" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/security/fsc-2005-3.shtml" }, { "name": "20544", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20544" }, { "name": "20547", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20547" }, { "name": "ADV-2005-2331", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2331" }, { "name": "20550", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20550" }, { "name": "20541", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20541" }, { "name": "20551", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20551" }, { "name": "20537", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20537" }, { "name": "1015159", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015159" }, { "name": "20545", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20545" }, { "name": "20513", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20513" }, { "name": "20552", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20552" }, { "name": "fsecure-scripts-root-privileges(22966)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22966" }, { "name": "20539", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20539" }, { "name": "20548", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20548" }, { "name": "15339", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15339" }, { "name": "20542", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20542" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3546", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "suid.cgi scripts in F-Secure (1) Internet Gatekeeper for Linux before 2.15.484 and (2) Anti-Virus Linux Gateway before 2.16 are installed SUID with world-executable permissions, which allows local users to gain privilege." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1015160", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015160" }, { "name": "20546", "refsource": "OSVDB", "url": "http://www.osvdb.org/20546" }, { "name": "20543", "refsource": "OSVDB", "url": "http://www.osvdb.org/20543" }, { "name": "20538", "refsource": "OSVDB", "url": "http://www.osvdb.org/20538" }, { "name": "20540", "refsource": "OSVDB", "url": "http://www.osvdb.org/20540" }, { "name": "20549", "refsource": "OSVDB", "url": "http://www.osvdb.org/20549" }, { "name": "17467", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17467" }, { "name": "http://www.f-secure.com/security/fsc-2005-3.shtml", "refsource": "CONFIRM", "url": "http://www.f-secure.com/security/fsc-2005-3.shtml" }, { "name": "20544", "refsource": "OSVDB", "url": "http://www.osvdb.org/20544" }, { "name": "20547", "refsource": "OSVDB", "url": "http://www.osvdb.org/20547" }, { "name": "ADV-2005-2331", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2331" }, { "name": "20550", "refsource": "OSVDB", "url": "http://www.osvdb.org/20550" }, { "name": "20541", "refsource": "OSVDB", "url": "http://www.osvdb.org/20541" }, { "name": "20551", "refsource": "OSVDB", "url": "http://www.osvdb.org/20551" }, { "name": "20537", "refsource": "OSVDB", "url": "http://www.osvdb.org/20537" }, { "name": "1015159", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015159" }, { "name": "20545", "refsource": "OSVDB", "url": "http://www.osvdb.org/20545" }, { "name": "20513", "refsource": "OSVDB", "url": "http://www.osvdb.org/20513" }, { "name": "20552", "refsource": "OSVDB", "url": "http://www.osvdb.org/20552" }, { "name": "fsecure-scripts-root-privileges(22966)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22966" }, { "name": "20539", "refsource": "OSVDB", "url": "http://www.osvdb.org/20539" }, { "name": "20548", "refsource": "OSVDB", "url": "http://www.osvdb.org/20548" }, { "name": "15339", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15339" }, { "name": "20542", "refsource": "OSVDB", "url": "http://www.osvdb.org/20542" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3546", "datePublished": "2005-11-16T07:37:00", "dateReserved": "2005-11-16T00:00:00", "dateUpdated": "2024-08-07T23:17:23.308Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-2442 (GCVE-0-2004-2442)
Vulnerability from cvelistv5
Published
2005-08-20 04:00
Modified
2024-08-08 01:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple interpretation error in various F-Secure Anti-Virus products, including Workstation 5.43 and earlier, Windows Servers 5.50 and earlier, MIMEsweeper 5.50 and earlier, Anti-Virus for Linux Servers and Gateways 4.61 and earlier, and other products, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on the target system.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:29:13.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "13263", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13263/" }, { "name": "P-041", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/p-041.shtml" }, { "name": "VU#968818", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/968818" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/security/fsc-2004-3.shtml" }, { "name": "11732", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11732" }, { "name": "fsecure-zip-scan-bypass(18217)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18217" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-11-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple interpretation error in various F-Secure Anti-Virus products, including Workstation 5.43 and earlier, Windows Servers 5.50 and earlier, MIMEsweeper 5.50 and earlier, Anti-Virus for Linux Servers and Gateways 4.61 and earlier, and other products, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on the target system." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "13263", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13263/" }, { "name": "P-041", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/p-041.shtml" }, { "name": "VU#968818", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/968818" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/security/fsc-2004-3.shtml" }, { "name": "11732", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11732" }, { "name": "fsecure-zip-scan-bypass(18217)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18217" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2442", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple interpretation error in various F-Secure Anti-Virus products, including Workstation 5.43 and earlier, Windows Servers 5.50 and earlier, MIMEsweeper 5.50 and earlier, Anti-Virus for Linux Servers and Gateways 4.61 and earlier, and other products, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on the target system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "13263", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13263/" }, { "name": "P-041", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/p-041.shtml" }, { "name": "VU#968818", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/968818" }, { "name": "http://www.f-secure.com/security/fsc-2004-3.shtml", "refsource": "CONFIRM", "url": "http://www.f-secure.com/security/fsc-2004-3.shtml" }, { "name": "11732", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11732" }, { "name": "fsecure-zip-scan-bypass(18217)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18217" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2442", "datePublished": "2005-08-20T04:00:00", "dateReserved": "2005-08-20T00:00:00", "dateUpdated": "2024-08-08T01:29:13.339Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33600 (GCVE-0-2021-33600)
Vulnerability from cvelistv5
Published
2021-09-28 09:06
Modified
2024-08-03 23:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service Vulnerability in Web Interface of F-Secure Internet Gatekeeper
Summary
A denial-of-service (DoS) vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. The vulnerability occurs because of an attacker can trigger assertion via malformed HTTP packet to web interface. An unauthenticated attacker could exploit this vulnerability by sending a large username parameter. A successful exploitation could lead to a denial-of-service of the product.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure | F-Secure Internet Gatekeeper |
Version: 5 Series All Version |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33600" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "F-Secure Internet Gatekeeper", "vendor": "F-Secure", "versions": [ { "status": "affected", "version": "5 Series All Version " } ] } ], "descriptions": [ { "lang": "en", "value": "A denial-of-service (DoS) vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. The vulnerability occurs because of an attacker can trigger assertion via malformed HTTP packet to web interface. An unauthenticated attacker could exploit this vulnerability by sending a large username parameter. A successful exploitation could lead to a denial-of-service of the product." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service Vulnerability in Web Interface of F-Secure Internet Gatekeeper", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-28T09:06:55", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33600" } ], "solutions": [ { "lang": "en", "value": "FIX: Hotfix 9 will be published to fix this vulnerability. Download and instructions available at: https://www.f-secure.com/en/business/downloads/internet-gatekeeper" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial of Service Vulnerability in Web Interface of F-Secure Internet Gatekeeper", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-33600", "STATE": "PUBLIC", "TITLE": "Denial of Service Vulnerability in Web Interface of F-Secure Internet Gatekeeper" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure Internet Gatekeeper", "version": { "version_data": [ { "version_affected": "=", "version_name": "5 Series", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A denial-of-service (DoS) vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. The vulnerability occurs because of an attacker can trigger assertion via malformed HTTP packet to web interface. An unauthenticated attacker could exploit this vulnerability by sending a large username parameter. A successful exploitation could lead to a denial-of-service of the product." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service Vulnerability in Web Interface of F-Secure Internet Gatekeeper" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33600", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33600" } ] }, "solution": [ { "lang": "en", "value": "FIX: Hotfix 9 will be published to fix this vulnerability. Download and instructions available at: https://www.f-secure.com/en/business/downloads/internet-gatekeeper" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2021-33600", "datePublished": "2021-09-28T09:06:55", "dateReserved": "2021-05-27T00:00:00", "dateUpdated": "2024-08-03T23:50:43.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28883 (GCVE-0-2022-28883)
Vulnerability from cvelistv5
Published
2022-08-23 15:54
Modified
2024-08-03 06:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service Vulnerability
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aerdl unpack function crashes. This can lead to a possible scanning engine crash. The exploit can be triggered remotely by an attacker.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure and WithSecure | All F-Secure and WithSecure Endpoint Protection products for Windows & Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection |
Version: All Version |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.181Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "All F-Secure and WithSecure Endpoint Protection products for Windows \u0026 Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection", "vendor": "F-Secure and WithSecure", "versions": [ { "status": "affected", "version": "All Version " } ] } ], "credits": [ { "lang": "en", "value": "WithSecure \u0026 F-Secure would like to thank faty420 https://twitter.com/faty420 for bringing this issue to our attention" } ], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure \u0026 WithSecure products whereby the aerdl unpack function crashes. This can lead to a possible scanning engine crash. The exploit can be triggered remotely by an attacker." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-23T15:54:14", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "solutions": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-08-10_06" } ], "source": { "discovery": "EXTERNAL" }, "title": "Denial-of-Service (DoS) Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2022-28883", "STATE": "PUBLIC", "TITLE": "Denial-of-Service (DoS) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "All F-Secure and WithSecure Endpoint Protection products for Windows \u0026 Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper WithSecure Cloud Protection for Salesforce WithSecure Collaboration Protection", "version": { "version_data": [ { "version_affected": "=", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure and WithSecure" } ] } }, "credit": [ { "lang": "eng", "value": "WithSecure \u0026 F-Secure would like to thank faty420 https://twitter.com/faty420 for bringing this issue to our attention" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure \u0026 WithSecure products whereby the aerdl unpack function crashes. This can lead to a possible scanning engine crash. The exploit can be triggered remotely by an attacker." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.withsecure.com/en/support/security-advisories", "refsource": "MISC", "url": "https://www.withsecure.com/en/support/security-advisories" } ] }, "solution": [ { "lang": "en", "value": "FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-08-10_06" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28883", "datePublished": "2022-08-23T15:54:14", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-03T06:03:53.181Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-3300 (GCVE-0-2007-3300)
Vulnerability from cvelistv5
Published
2007-06-20 22:00
Modified
2024-08-07 14:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070619 allow remote attackers to bypass scanning via a crafted header in a (1) LHA or (2) RAR archive.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:14:12.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25738", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25738" }, { "name": "24525", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24525" }, { "name": "1018267", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018267" }, { "name": "fsecure-lzh-rar-security-bypass(34942)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34942" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/security/fsc-2007-5.shtml" }, { "name": "36729", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36729" }, { "name": "1018266", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018266" }, { "name": "ADV-2007-2247", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2247" }, { "name": "1018268", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018268" }, { "name": "36728", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36728" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-06-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070619 allow remote attackers to bypass scanning via a crafted header in a (1) LHA or (2) RAR archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25738", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25738" }, { "name": "24525", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24525" }, { "name": "1018267", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018267" }, { "name": "fsecure-lzh-rar-security-bypass(34942)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34942" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/security/fsc-2007-5.shtml" }, { "name": "36729", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36729" }, { "name": "1018266", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018266" }, { "name": "ADV-2007-2247", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2247" }, { "name": "1018268", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018268" }, { "name": "36728", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36728" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3300", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070619 allow remote attackers to bypass scanning via a crafted header in a (1) LHA or (2) RAR archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25738", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25738" }, { "name": "24525", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24525" }, { "name": "1018267", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018267" }, { "name": "fsecure-lzh-rar-security-bypass(34942)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34942" }, { "name": "http://www.f-secure.com/security/fsc-2007-5.shtml", "refsource": "CONFIRM", "url": "http://www.f-secure.com/security/fsc-2007-5.shtml" }, { "name": "36729", "refsource": "OSVDB", "url": "http://osvdb.org/36729" }, { "name": "1018266", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018266" }, { "name": "ADV-2007-2247", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2247" }, { "name": "1018268", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018268" }, { "name": "36728", "refsource": "OSVDB", "url": "http://osvdb.org/36728" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3300", "datePublished": "2007-06-20T22:00:00", "dateReserved": "2007-06-20T00:00:00", "dateUpdated": "2024-08-07T14:14:12.937Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0052 (GCVE-0-2004-0052)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard separator characters, or use standard separators incorrectly, within MIME headers, fields, parameters, or values, which may be interpreted differently by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:01:23.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mime-separator-filtering-bypass(17334)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17334" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME separator issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517669115891\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard separator characters, or use standard separators incorrectly, within MIME headers, fields, parameters, or values, which may be interpreted differently by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mime-separator-filtering-bypass(17334)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17334" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME separator issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517669115891\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard separator characters, or use standard separators incorrectly, within MIME headers, fields, parameters, or values, which may be interpreted differently by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mime-separator-filtering-bypass(17334)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17334" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME separator issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109517669115891\u0026w=2" }, { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0052", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2004-01-14T00:00:00", "dateUpdated": "2024-08-08T00:01:23.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1016 (GCVE-0-2003-1016)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 02:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use malformed quoting in MIME headers, parameters, and values, including (1) fields that should not be quoted, (2) duplicate quotes, or (3) missing leading or trailing quote characters, which may be interpreted differently by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:12:35.543Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mime-quote-filtering-bypass(17336)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17336" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field quoting issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109521027007616\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use malformed quoting in MIME headers, parameters, and values, including (1) fields that should not be quoted, (2) duplicate quotes, or (3) missing leading or trailing quote characters, which may be interpreted differently by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mime-quote-filtering-bypass(17336)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17336" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field quoting issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109521027007616\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1016", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use malformed quoting in MIME headers, parameters, and values, including (1) fields that should not be quoted, (2) duplicate quotes, or (3) missing leading or trailing quote characters, which may be interpreted differently by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mime-quote-filtering-bypass(17336)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17336" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field quoting issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109521027007616\u0026w=2" }, { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1016", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2003-12-17T00:00:00", "dateUpdated": "2024-08-08T02:12:35.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-1782 (GCVE-0-2009-1782)
Vulnerability from cvelistv5
Published
2009-05-22 20:00
Modified
2024-08-07 05:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:27:54.272Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35008", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35008" }, { "name": "1022172", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022172" }, { "name": "ADV-2009-1262", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1262" }, { "name": "1022170", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022170" }, { "name": "fsecure-rar-zip-security-bypass(50346)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50346" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html" }, { "name": "34849", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34849" }, { "name": "1022171", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022171" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35008", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35008" }, { "name": "1022172", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022172" }, { "name": "ADV-2009-1262", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1262" }, { "name": "1022170", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022170" }, { "name": "fsecure-rar-zip-security-bypass(50346)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50346" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html" }, { "name": "34849", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34849" }, { "name": "1022171", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022171" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1782", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35008", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35008" }, { "name": "1022172", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022172" }, { "name": "ADV-2009-1262", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1262" }, { "name": "1022170", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022170" }, { "name": "fsecure-rar-zip-security-bypass(50346)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50346" }, { "name": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html", "refsource": "CONFIRM", "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html" }, { "name": "34849", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34849" }, { "name": "1022171", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022171" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1782", "datePublished": "2009-05-22T20:00:00", "dateReserved": "2009-05-22T00:00:00", "dateUpdated": "2024-08-07T05:27:54.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-03-01 12:15
Modified
2024-11-21 06:31
Severity ?
4.6 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Linux Security whereby the Fmlib component used in certain F-Secure products can crash while scanning fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service of the Anti-Virus engine.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | atlant | * | |
f-secure | elements_endpoint_protection | * | |
f-secure | internet_gatekeeper | * | |
f-secure | linux_security | * | |
f-secure | security_cloud | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:*:*:*:*:*:*:*:*", "matchCriteriaId": "57C8A204-70F5-449A-AB4F-A33823367B39", "versionEndExcluding": "2022-02-23_01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:mac:*:*", "matchCriteriaId": "15D28175-A8B5-4B18-8FF2-DE953630DD6B", "versionEndExcluding": "2022-02-23_01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "249DE15A-0756-4969-9228-ACC1BAC42FA5", "versionEndIncluding": "2022-02-23_01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBEF97B2-9C51-4B51-AE1A-363572757604", "versionEndExcluding": "2022-02-23_01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:security_cloud:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E59B674-ADF0-49F2-A389-6AB0678C12B1", "versionEndExcluding": "2022-02-23_01", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Linux Security whereby the Fmlib component used in certain F-Secure products can crash while scanning fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service of the Anti-Virus engine." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en F-Secure Linux Security por la que el componente Fmlib usado en determinados productos de F-Secure puede bloquearse mientras son escaneados archivos fuzzed. La explotaci\u00f3n puede ser desencadenada remotamente por un atacante. Un ataque con \u00e9xito resultar\u00e1 en la Denegaci\u00f3n de Servicio del motor Antivirus." } ], "id": "CVE-2021-44747", "lastModified": "2024-11-21T06:31:31.177", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 2.5, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-01T12:15:07.493", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in multiple F-Secure Anti-Virus products, including F-Secure Anti-Virus 5.42 and earlier, allows remote attackers to bypass scanning or cause a denial of service (crash or module restart), depending on the product, via a malformed LHA archive.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/11712 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.f-secure.com/security/fsc-2004-1.shtml | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/16258 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/11712 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/security/fsc-2004-1.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/16258 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | 4.60 | |
f-secure | f-secure_for_firewalls | * | |
f-secure | f-secure_internet_security | * | |
f-secure | internet_gatekeeper | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux:*:*:*:*:*", "matchCriteriaId": "0B513907-648B-4F67-96D1-E028C389E874", "versionEndIncluding": "4.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "D1087A49-25FB-4523-B8B6-6095BFD7BB7B", "versionEndIncluding": "5.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "131C7D74-C1E0-47D6-8246-5B77330F7E02", "versionEndIncluding": "5.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:workstations:*:*:*:*:*", "matchCriteriaId": "0FA31012-C608-4157-8E9E-4A4CD291323A", "versionEndIncluding": "5.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:client_security:*:*:*:*:*", "matchCriteriaId": "482547EC-5A01-43D9-9F97-11C012E0F119", "versionEndIncluding": "5.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "52BD1305-8A6C-4FF1-9966-CDE0A1A18E9E", "versionEndIncluding": "6.21", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:*:*:*:*:*:*", "matchCriteriaId": "A81A600F-BD38-409D-BF4C-0DA25503E475", "versionEndIncluding": "2004", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*", "matchCriteriaId": "C8C41338-0651-425E-A823-C8CBD91977D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_for_firewalls:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD9176A3-93E8-40E6-A386-4EC5B86EEDDE", "versionEndIncluding": "6.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AA685D1-05A2-4036-A0D9-F2B048B26B0B", "versionEndIncluding": "2004", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C3DFCF8-010C-4877-A17D-59F6E58A05C0", "versionEndIncluding": "6.32", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in multiple F-Secure Anti-Virus products, including F-Secure Anti-Virus 5.42 and earlier, allows remote attackers to bypass scanning or cause a denial of service (crash or module restart), depending on the product, via a malformed LHA archive." } ], "id": "CVE-2004-2405", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/11712" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2004-1.shtml" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/11712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2004-1.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16258" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-23 16:15
Modified
2024-11-21 06:58
Severity ?
3.5 (Low) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aerdl unpack function crashes. This can lead to a possible scanning engine crash. The exploit can be triggered remotely by an attacker.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | elements_endpoint_protection | * | |
apple | macos | - | |
microsoft | windows | - | |
f-secure | atlant | * | |
f-secure | cloud_protection_for_salesforce | * | |
f-secure | elements_collaboration_protection | * | |
f-secure | internet_gatekeeper | * | |
f-secure | linux_security | * | |
f-secure | linux_security_64 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DFC1F94-8A8B-42E2-887B-EE8FB3C9130D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C97DC3C-1B63-4B57-8C62-ACD77D0A3E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:cloud_protection_for_salesforce:*:*:*:*:*:*:*:*", "matchCriteriaId": "31ECCE87-B67E-4CA7-91E6-8E71CEA6DA21", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_collaboration_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B107FE0-0F9E-4021-917F-1224F2619339", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "88F6E1F2-02DA-48EE-B127-4933CCC80C5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:x86:*", "matchCriteriaId": "F0152E70-F7A9-4785-8A43-78472F9A2C13", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security_64:*:*:*:*:*:*:*:*", "matchCriteriaId": "360DBC2B-2B93-461E-90C6-60C55FBD87B8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure \u0026 WithSecure products whereby the aerdl unpack function crashes. This can lead to a possible scanning engine crash. The exploit can be triggered remotely by an attacker." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en los productos F-Secure y WithSecure por la que la funci\u00f3n de desempaquetado de aerdl es bloqueada. Esto puede conllevar a un posible bloqueo del motor de escaneo. La explotaci\u00f3n puede ser desencadenado remotamente por un atacante." } ], "id": "CVE-2022-28883", "lastModified": "2024-11-21T06:58:07.860", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 2.5, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-23T16:15:10.283", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-06-20 22:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070619 allow remote attackers to bypass scanning via a crafted header in a (1) LHA or (2) RAR archive.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://osvdb.org/36728 | ||
cve@mitre.org | http://osvdb.org/36729 | ||
cve@mitre.org | http://secunia.com/advisories/25738 | Vendor Advisory | |
cve@mitre.org | http://www.f-secure.com/security/fsc-2007-5.shtml | ||
cve@mitre.org | http://www.securityfocus.com/bid/24525 | ||
cve@mitre.org | http://www.securitytracker.com/id?1018266 | ||
cve@mitre.org | http://www.securitytracker.com/id?1018267 | ||
cve@mitre.org | http://www.securitytracker.com/id?1018268 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/2247 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/34942 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/36728 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/36729 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25738 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/security/fsc-2007-5.shtml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/24525 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018266 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018267 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018268 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/2247 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/34942 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | f-secure_anti-virus | 2.16 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.61 | |
f-secure | f-secure_anti-virus | 4.61 | |
f-secure | f-secure_anti-virus | 4.64 | |
f-secure | f-secure_anti-virus | 4.64 | |
f-secure | f-secure_anti-virus | 4.65 | |
f-secure | f-secure_anti-virus | 4.65 | |
f-secure | f-secure_anti-virus | 5.0.2 | |
f-secure | f-secure_anti-virus | 5.2.1 | |
f-secure | f-secure_anti-virus | 5.3.0 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.40 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.43 | |
f-secure | f-secure_anti-virus | 5.44 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 5.54 | |
f-secure | f-secure_anti-virus | 5.55 | |
f-secure | f-secure_anti-virus | 5.56 | |
f-secure | f-secure_anti-virus | 5.61 | |
f-secure | f-secure_anti-virus | 6.01 | |
f-secure | f-secure_anti-virus | 6.01 | |
f-secure | f-secure_anti-virus | 6.02 | |
f-secure | f-secure_anti-virus | 6.2 | |
f-secure | f-secure_anti-virus | 6.03 | |
f-secure | f-secure_anti-virus | 6.21 | |
f-secure | f-secure_anti-virus | 6.30 | |
f-secure | f-secure_anti-virus | 6.30_sr1 | |
f-secure | f-secure_anti-virus | 6.31 | |
f-secure | f-secure_anti-virus | 6.40 | |
f-secure | f-secure_anti-virus | 6.60 | |
f-secure | f-secure_anti-virus | 6.61 | |
f-secure | f-secure_anti-virus | 7.00 | |
f-secure | f-secure_anti-virus | 7.00 | |
f-secure | f-secure_anti-virus | 7.00 | |
f-secure | f-secure_anti-virus | 7.00 | |
f-secure | f-secure_anti-virus | 2005 | |
f-secure | f-secure_anti-virus | 2006 | |
f-secure | f-secure_anti-virus | 2007 | |
f-secure | f-secure_anti-virus_linux_client_security | * | |
f-secure | f-secure_anti-virus_linux_server_security | * | |
f-secure | f-secure_internet_security | 2005 | |
f-secure | f-secure_internet_security | 2006 | |
f-secure | f-secure_internet_security | 2007 | |
f-secure | internet_gatekeeper | * | |
f-secure | internet_gatekeeper | 2.06 | |
f-secure | internet_gatekeeper | 2.14 | |
f-secure | internet_gatekeeper | 2.15.484 | |
f-secure | internet_gatekeeper | 2.16 | |
f-secure | solutions_based_on_f-secure_personal_express | 6.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2.16:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "1473BDA6-ADD8-41C0-95DD-D82A1317FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "6CC9AA17-3EF4-4BC5-9E29-5A6525B9AC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "A9C60C23-FC4D-4D14-B3E3-ECD797888AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "4AE00A20-8152-48D9-9AC4-EA359284E635", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "6B334073-9FF3-4F75-8702-51DB6937B7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "5A277838-B3AE-45E4-9E1D-005F63FB7573", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "33C62796-C9C0-485E-A58B-6510AFA80F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "2F448567-DCAB-4B5F-B939-5B630A5A9B70", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "A49C5BE3-EF09-4B73-A8F7-95B428EB28F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.65:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "46D73A43-3FBF-422D-B3CF-136F4B7A9A5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.65:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "58668CA2-425C-470E-BA2A-E791EEED6046", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D8549318-DCD7-420A-AAD6-CE1D7E167E20", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6BB606BE-CCA7-41BF-AB9F-E7C362FBADA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E92D04F2-5029-445C-ADF5-4FCC11E658BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*", "matchCriteriaId": "46F72328-7B69-4A1B-A065-E65544F27A75", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.40:*:workstations:*:*:*:*:*", "matchCriteriaId": "461627F0-2CEF-4623-B38E-6B30059B0B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "C0D25A1D-2B31-4B29-96FE-A793F8244F66", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:workstations:*:*:*:*:*", "matchCriteriaId": "AC90ADFD-32FE-4EA1-9583-5EFE585152CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "858468E0-4208-4703-A3AA-4BF6CC254DDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:workstations:*:*:*:*:*", "matchCriteriaId": "4E26052D-35B8-44E7-8F66-442BA55F4483", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.43:*:workstations:*:*:*:*:*", "matchCriteriaId": "352EE11B-2385-4359-BEA1-706FEA3E9D9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.44:*:workstations:*:*:*:*:*", "matchCriteriaId": "D35E1591-553E-42F0-AE3E-16A2A5640F9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:citrix_servers:*:*:*:*:*", "matchCriteriaId": "CAB9474C-A4F9-45C0-A77C-34B794AE2262", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*", "matchCriteriaId": "CBA4A9B7-626A-4539-852F-96C49D860E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.54:*:client_security:*:*:*:*:*", "matchCriteriaId": "6D9796D5-C957-410D-96A8-7C1AC1D614A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.55:*:client_security:*:*:*:*:*", "matchCriteriaId": "94B734B9-4D8C-4195-AA01-83DDEC535BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "9EDFA260-07D3-463D-BDAA-4C6F9F4D52FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.61:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "AEF8C12D-ADF4-4FAE-8B13-B69BFA5AFF2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:client_security:*:*:*:*:*", "matchCriteriaId": "F874EF46-3E17-4A51-A576-7E0BFE1FD4EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "1171FFA9-4898-4174-AD17-C6E47A120585", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.02:*:client_security:*:*:*:*:*", "matchCriteriaId": "995DCFD5-5745-48E6-BC0E-B8AE3F194CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "4401535F-9AC5-4419-A6B6-9A877887A3D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.03:*:client_security:*:*:*:*:*", "matchCriteriaId": "2B5FC2F8-A355-4964-B908-0DCC00734BB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "19828867-7079-4233-A3B8-BF7A3052FB8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "97610DB9-0379-4EB3-95E6-9B5C21E5A6E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30_sr1:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "5777A2C3-5EB0-495E-8E0E-94BCA86D5E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.31:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "2D43D811-F305-4709-9C43-862A7FC783B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.40:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "375B5B66-822B-4142-BAA3-0928DE7A8D6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.60:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "3F1CCFFE-4745-46BE-840F-F658245A6058", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.61:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "880E04C0-42C2-4261-92D1-CF83133567F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:client_security:*:*:*:*:*", "matchCriteriaId": "D990AE62-7B09-4DA8-ADB7-3CBA2DF18683", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "C2BF5C8E-D1C4-4082-AFBE-8A8413CE1392", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "BED6F056-D9E2-4799-A432-DC07F8154AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:workstations:*:*:*:*:*", "matchCriteriaId": "4382A281-75F3-455C-B7EF-8514531C17C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "7C2C1784-2482-4CBE-BE6D-4519C3FB64BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "9A6B8424-EED8-4A09-9A9C-FC5F76A9FAF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2007:*:*:*:*:*:*:*", "matchCriteriaId": "1106DE08-DE9A-488B-8C5D-28E353CDEEEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "D98FEBC4-42EF-49BE-B4D5-03CC171802CA", "versionEndIncluding": "5.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "47A4B299-F94E-4369-A388-CE245A5D9B22", "versionEndIncluding": "5.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "89A0FDD3-3364-4452-BD6F-EB6F85D3119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C788A5AB-C847-476C-9767-C6711F2D4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2007:*:*:*:*:*:*:*", "matchCriteriaId": "3972C7F1-8B78-4A5D-8A75-C6CA01E997DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E1AD9C7-5990-4BFE-A2D2-7845EDBF478A", "versionEndIncluding": "6.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:2.06:*:linux:*:*:*:*:*", "matchCriteriaId": "33E76051-5D4A-4C8C-A911-3B78BFEA77CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:2.14:*:linux:*:*:*:*:*", "matchCriteriaId": "46AD4E4B-E01A-4CC5-8D05-14B5B6935408", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:2.15.484:*:linux:*:*:*:*:*", "matchCriteriaId": "574BD76C-3990-4B5D-B111-B6D980B166CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:2.16:*:linux:*:*:*:*:*", "matchCriteriaId": "E5668C3F-8BA7-47B1-8428-21D7346824DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:solutions_based_on_f-secure_personal_express:6.20:*:*:*:*:*:*:*", "matchCriteriaId": "E99B3025-7A16-4AD8-A5F8-2CE2D7E3E102", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070619 allow remote attackers to bypass scanning via a crafted header in a (1) LHA or (2) RAR archive." }, { "lang": "es", "value": "M\u00faltiples productos antivirus de F-Secure para Microsoft Windows y Linux anterior al 19/06/2007 permiten a atacantes remotos evitar el escaneo mediante una cabecera artesanal en un archivo (1) LHA o (2) RAR." } ], "id": "CVE-2007-3300", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-06-20T22:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/36728" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/36729" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25738" }, { "source": "cve@mitre.org", "url": "http://www.f-secure.com/security/fsc-2007-5.shtml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24525" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018266" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018267" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018268" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2247" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34942" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.f-secure.com/security/fsc-2007-5.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2247" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34942" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-09-09 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The Content Scanner Server in F-Secure Anti-Virus for Microsoft Exchange 6.21 and earlier, F-Secure Anti-Virus for Microsoft Exchange 6.01 and earlier, and F-Secure Internet Gatekeeper 6.32 and earlier allow remote attackers to cause a denial of service (service crash due to unhandled exception) via a certain malformed packet.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=109483205925698&w=2 | ||
cve@mitre.org | http://www.f-secure.com/security/fsc-2004-2.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.idefense.com/application/poi/display?id=137&type=vulnerabilities | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/11145 | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/17307 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=109483205925698&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/security/fsc-2004-2.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.idefense.com/application/poi/display?id=137&type=vulnerabilities | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/11145 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/17307 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | f-secure_anti-virus | 6.01 | |
f-secure | f-secure_anti-virus | 6.2 | |
f-secure | f-secure_anti-virus | 6.21 | |
f-secure | f-secure_content_scanner_server | 6.31 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "1171FFA9-4898-4174-AD17-C6E47A120585", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "4401535F-9AC5-4419-A6B6-9A877887A3D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "19828867-7079-4233-A3B8-BF7A3052FB8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_content_scanner_server:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "79A9C098-AE60-43A7-BCE9-9DA1F2EA0B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Content Scanner Server in F-Secure Anti-Virus for Microsoft Exchange 6.21 and earlier, F-Secure Anti-Virus for Microsoft Exchange 6.01 and earlier, and F-Secure Internet Gatekeeper 6.32 and earlier allow remote attackers to cause a denial of service (service crash due to unhandled exception) via a certain malformed packet." } ], "id": "CVE-2004-0830", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-09-09T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109483205925698\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2004-2.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=137\u0026type=vulnerabilities" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11145" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109483205925698\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2004-2.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=137\u0026type=vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17307" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-08-18 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes ("//absolute/path").
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000840 | ||
cve@mitre.org | http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html | ||
cve@mitre.org | http://marc.info/?l=bugtraq&m=108422737918885&w=2 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200405-02.xml | ||
cve@mitre.org | http://www.debian.org/security/2004/dsa-515 | ||
cve@mitre.org | http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2004-178.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2004-179.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/10243 | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | https://bugzilla.fedora.us/show_bug.cgi?id=1833 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/16013 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10409 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000840 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=108422737918885&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200405-02.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2004/dsa-515 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2004-178.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2004-179.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/10243 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.fedora.us/show_bug.cgi?id=1833 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/16013 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10409 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.0 | |
clearswift | mailsweeper | 4.1 | |
clearswift | mailsweeper | 4.2 | |
clearswift | mailsweeper | 4.3 | |
clearswift | mailsweeper | 4.3.3 | |
clearswift | mailsweeper | 4.3.4 | |
clearswift | mailsweeper | 4.3.5 | |
clearswift | mailsweeper | 4.3.6 | |
clearswift | mailsweeper | 4.3.6_sp1 | |
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.60 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 6.21 | |
f-secure | f-secure_anti-virus | 2003 | |
f-secure | f-secure_anti-virus | 2004 | |
f-secure | f-secure_for_firewalls | 6.20 | |
f-secure | f-secure_internet_security | 2003 | |
f-secure | f-secure_internet_security | 2004 | |
f-secure | f-secure_personal_express | 4.5 | |
f-secure | f-secure_personal_express | 4.6 | |
f-secure | f-secure_personal_express | 4.7 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
rarlab | winrar | 3.20 | |
redhat | lha | 1.14i-9 | |
sgi | propack | 2.4 | |
sgi | propack | 3.0 | |
stalker | cgpmcafee | 3.2 | |
tsugio_okamoto | lha | 1.14 | |
tsugio_okamoto | lha | 1.15 | |
tsugio_okamoto | lha | 1.17 | |
winzip | winzip | 9.0 | |
redhat | fedora_core | core_1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFE4FA19-F2EA-4292-A441-2E4A39366942", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA5D7FD1-D5AB-4987-801A-FA464C31298A", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "772710C7-41FE-47E2-B0D7-A3C8D36C8808", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7358AD98-44C1-4CC4-BD50-CFF3822F3A96", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AAA1C283-E518-4BC6-BBF0-FCE09F9E0F17", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "5B8A74FB-07B0-42D6-ABF3-D7A073A329E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "49668AFD-4821-4D5A-BEBD-DF55A8AB58C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "57E0BFFD-D777-43A5-AEE8-765F55C86E93", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.6_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "DAF9A151-6EBF-4760-A154-A34FF7C9E632", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "6CC9AA17-3EF4-4BC5-9E29-5A6525B9AC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "A9C60C23-FC4D-4D14-B3E3-ECD797888AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "D04E2381-68CB-455F-8878-17C8E4112C95", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "4AE00A20-8152-48D9-9AC4-EA359284E635", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "6B334073-9FF3-4F75-8702-51DB6937B7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "2D553EF0-6A08-4DD0-A301-99AADAFBFFBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*", "matchCriteriaId": "C8C41338-0651-425E-A823-C8CBD91977D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*", "matchCriteriaId": "46F72328-7B69-4A1B-A065-E65544F27A75", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "2BA28970-0DB9-433E-83A1-36BF05DB062A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "C0D25A1D-2B31-4B29-96FE-A793F8244F66", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:workstations:*:*:*:*:*", "matchCriteriaId": "AC90ADFD-32FE-4EA1-9583-5EFE585152CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "B490FC59-616A-4F90-95D8-50F9C0D6CB40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "858468E0-4208-4703-A3AA-4BF6CC254DDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:workstations:*:*:*:*:*", "matchCriteriaId": "4E26052D-35B8-44E7-8F66-442BA55F4483", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*", "matchCriteriaId": "CBA4A9B7-626A-4539-852F-96C49D860E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "19828867-7079-4233-A3B8-BF7A3052FB8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2003:*:*:*:*:*:*:*", "matchCriteriaId": "831F0C4D-C85F-46DA-BC9E-D3F56DE2B085", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7F996B07-8B07-42A6-86FC-B5B55F708861", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_for_firewalls:6.20:*:*:*:*:*:*:*", "matchCriteriaId": "119D5A71-E7C2-4603-9D78-A161D82BC2D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2003:*:*:*:*:*:*:*", "matchCriteriaId": "6689D4E1-F8DC-46D9-BA35-4E4AE9C28456", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "0429B86A-F228-44E8-ABBB-D57BEE3679F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "72DE7015-C1FF-4803-8B28-5AF5ECC3AAB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "D04F7296-3290-40D1-9CFB-E52FADAE5719", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.7:*:*:*:*:*:*:*", "matchCriteriaId": "B9A0DDB6-4B86-430E-879A-C835DBB96C42", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "C1011521-AEF2-40EB-B671-66B20FF01CC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:lha:1.14i-9:*:i386:*:*:*:*:*", "matchCriteriaId": "EB59539A-8973-45C8-A553-1B524DA43937", "vulnerable": true }, { "criteria": "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0702A32E-E577-403C-B4D9-15037D7100A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "29DC217F-C257-4A3C-9CBD-08010C30BEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:stalker:cgpmcafee:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FC4CB399-2E2F-4A73-BA41-3EFB0DBDC404", "vulnerable": true }, { "criteria": "cpe:2.3:a:tsugio_okamoto:lha:1.14:*:*:*:*:*:*:*", "matchCriteriaId": "081C75A4-FDB1-4941-8276-985570632A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:tsugio_okamoto:lha:1.15:*:*:*:*:*:*:*", "matchCriteriaId": "A623BD1B-DB9A-4545-9970-E3492AA39A33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tsugio_okamoto:lha:1.17:*:*:*:*:*:*:*", "matchCriteriaId": "8984B914-9850-405C-AAE6-A7C266F13BA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:winzip:winzip:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "523ADB29-C3D5-4C06-89B6-22B5FC68C240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C84296C-2C8A-4DCD-9751-52951F8BEA9F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes (\"//absolute/path\")." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de atravesamiento de directorios en LHA 1.14 permite a atacantes locales o usuarios locales crear ficheros arbitrarios mediante un archivo LHA conteniendo nombres de fichero con secuencias (1) \"..\" (punto punto) o (2) rutas absolutas con barra inicial doble (\"//ruta/absoluta\")." } ], "id": "CVE-2004-0235", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-08-18T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2004/dsa-515" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10243" }, { "source": "cve@mitre.org", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16013" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10409" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2004/dsa-515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple interpretation error in various F-Secure Anti-Virus products, including Workstation 5.43 and earlier, Windows Servers 5.50 and earlier, MIMEsweeper 5.50 and earlier, Anti-Virus for Linux Servers and Gateways 4.61 and earlier, and other products, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on the target system.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/13263/ | Patch | |
cve@mitre.org | http://www.ciac.org/ciac/bulletins/p-041.shtml | Vendor Advisory | |
cve@mitre.org | http://www.f-secure.com/security/fsc-2004-3.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.kb.cert.org/vuls/id/968818 | Third Party Advisory, US Government Resource | |
cve@mitre.org | http://www.securityfocus.com/bid/11732 | Patch | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/18217 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/13263/ | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ciac.org/ciac/bulletins/p-041.shtml | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/security/fsc-2004-3.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/968818 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/11732 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/18217 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.60 | |
f-secure | f-secure_anti-virus | 4.61 | |
f-secure | f-secure_anti-virus | 4.61 | |
f-secure | f-secure_anti-virus | 5.0 | |
f-secure | f-secure_anti-virus | 5.0 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.43 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 5.55 | |
f-secure | f-secure_anti-virus | 6.01 | |
f-secure | f-secure_anti-virus | 6.2 | |
f-secure | f-secure_anti-virus | 6.21 | |
f-secure | f-secure_anti-virus | 6.30 | |
f-secure | f-secure_anti-virus | 6.30_sr1 | |
f-secure | f-secure_anti-virus | 6.31 | |
f-secure | f-secure_anti-virus | 2004 | |
f-secure | f-secure_anti-virus | 2005 | |
f-secure | f-secure_for_firewalls | 6.20 | |
f-secure | f-secure_internet_security | 2004 | |
f-secure | f-secure_internet_security | 2005 | |
f-secure | f-secure_personal_express | 4.5 | |
f-secure | f-secure_personal_express | 4.6 | |
f-secure | f-secure_personal_express | 4.7 | |
f-secure | f-secure_personal_express | 5.0 | |
f-secure | internet_gatekeeper | 2.6 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
f-secure | internet_gatekeeper | 6.41 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "6CC9AA17-3EF4-4BC5-9E29-5A6525B9AC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "A9C60C23-FC4D-4D14-B3E3-ECD797888AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "D04E2381-68CB-455F-8878-17C8E4112C95", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "4AE00A20-8152-48D9-9AC4-EA359284E635", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "6B334073-9FF3-4F75-8702-51DB6937B7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "2D553EF0-6A08-4DD0-A301-99AADAFBFFBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*", "matchCriteriaId": "C8C41338-0651-425E-A823-C8CBD91977D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "5A277838-B3AE-45E4-9E1D-005F63FB7573", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "33C62796-C9C0-485E-A58B-6510AFA80F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:linux_client_security:*:*:*:*:*", "matchCriteriaId": "016877EA-FBDE-4E49-8077-CFFCFB8E7DFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:linux_server_security:*:*:*:*:*", "matchCriteriaId": "8CFC86C0-2E3E-4057-808C-358B4B0463F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*", "matchCriteriaId": "46F72328-7B69-4A1B-A065-E65544F27A75", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "A8B5F6AF-561B-45B4-8087-D637FAB9E877", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "B7D558FE-0C41-4FC1-AF94-2CDE69FF8CD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "2BA28970-0DB9-433E-83A1-36BF05DB062A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "C0D25A1D-2B31-4B29-96FE-A793F8244F66", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:workstations:*:*:*:*:*", "matchCriteriaId": "AC90ADFD-32FE-4EA1-9583-5EFE585152CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "B490FC59-616A-4F90-95D8-50F9C0D6CB40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "858468E0-4208-4703-A3AA-4BF6CC254DDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:workstations:*:*:*:*:*", "matchCriteriaId": "4E26052D-35B8-44E7-8F66-442BA55F4483", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.43:*:workstations:*:*:*:*:*", "matchCriteriaId": "352EE11B-2385-4359-BEA1-706FEA3E9D9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*", "matchCriteriaId": "CBA4A9B7-626A-4539-852F-96C49D860E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.55:*:client_security:*:*:*:*:*", "matchCriteriaId": "94B734B9-4D8C-4195-AA01-83DDEC535BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "1171FFA9-4898-4174-AD17-C6E47A120585", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "4401535F-9AC5-4419-A6B6-9A877887A3D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "19828867-7079-4233-A3B8-BF7A3052FB8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "97610DB9-0379-4EB3-95E6-9B5C21E5A6E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30_sr1:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "5777A2C3-5EB0-495E-8E0E-94BCA86D5E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.31:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "2D43D811-F305-4709-9C43-862A7FC783B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7F996B07-8B07-42A6-86FC-B5B55F708861", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "7C2C1784-2482-4CBE-BE6D-4519C3FB64BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_for_firewalls:6.20:*:*:*:*:*:*:*", "matchCriteriaId": "119D5A71-E7C2-4603-9D78-A161D82BC2D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "0429B86A-F228-44E8-ABBB-D57BEE3679F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "89A0FDD3-3364-4452-BD6F-EB6F85D3119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "72DE7015-C1FF-4803-8B28-5AF5ECC3AAB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "D04F7296-3290-40D1-9CFB-E52FADAE5719", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.7:*:*:*:*:*:*:*", "matchCriteriaId": "B9A0DDB6-4B86-430E-879A-C835DBB96C42", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA95C918-917F-4A49-822C-487A07E6F91E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:2.6:*:linux:*:*:*:*:*", "matchCriteriaId": "CC709820-939F-438A-8CAD-A9D4E192C332", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.41:*:*:*:*:*:*:*", "matchCriteriaId": "05453A15-69B7-40AD-B14E-D00432DC4344", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple interpretation error in various F-Secure Anti-Virus products, including Workstation 5.43 and earlier, Windows Servers 5.50 and earlier, MIMEsweeper 5.50 and earlier, Anti-Virus for Linux Servers and Gateways 4.61 and earlier, and other products, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on the target system." } ], "id": "CVE-2004-2442", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/13263/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.ciac.org/ciac/bulletins/p-041.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2004-3.shtml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/968818" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11732" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/13263/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.ciac.org/ciac/bulletins/p-041.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2004-3.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/968818" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11732" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18217" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-07-22 16:15
Modified
2024-11-21 06:58
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aepack.dll component can crash the scanning engine.
References
▶ | URL | Tags | |
---|---|---|---|
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
cve-notifications-us@f-secure.com | https://www.withsecure.com/en/support/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.withsecure.com/en/support/security-advisories | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | elements_endpoint_protection | - | |
apple | macos | - | |
f-secure | atlant | - | |
f-secure | cloud_protection_for_salesforce | - | |
f-secure | elements_collaboration_protection | - | |
f-secure | internet_gatekeeper | - | |
f-secure | linux_security | - | |
f-secure | linux_security_64 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:-:*:*:*:*:*:*:*", "matchCriteriaId": "7098F9BA-B2C0-4310-96D5-D0134761F7A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8AF772-E3DC-4C9B-B3E8-81103D3B7BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:cloud_protection_for_salesforce:-:*:*:*:*:*:*:*", "matchCriteriaId": "F04F9410-836A-428B-9959-4662E79D963D", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_collaboration_protection:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28AA80A-1FF6-4DD6-BCCB-C455C2BB5032", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:-:*:*:*:*:-:*:*", "matchCriteriaId": "716021F0-35B9-4567-838A-DAEC65A6601F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:-:*:*:*:*:*:x86:*", "matchCriteriaId": "26113C91-7FD5-4C3B-84F7-6A986CA26461", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5E48AF8-57C4-4DFB-9E64-E3B3352941E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aepack.dll component can crash the scanning engine." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de Denegaci\u00f3n de Servicio (DoS) en F-Secure Atlant y en determinados productos WithSecure por la que el escaneo del componente aepack.dll puede bloquear el motor de escaneo" } ], "id": "CVE-2022-28879", "lastModified": "2024-11-21T06:58:07.350", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.4, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-22T16:15:08.247", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-06-06 20:06
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the web console in F-Secure Anti-Virus for Microsoft Exchange 6.40, and Internet Gatekeeper 6.40 through 6.42 and 6.50 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors. NOTE: By default, the connections are only allowed from the local host.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20407 | Patch, Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1016196 | ||
cve@mitre.org | http://securitytracker.com/id?1016197 | Patch | |
cve@mitre.org | http://www.f-secure.com/security/fsc-2006-3.shtml | Patch | |
cve@mitre.org | http://www.vupen.com/english/advisories/2006/2076 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/26799 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20407 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1016196 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1016197 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/security/fsc-2006-3.shtml | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/2076 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/26799 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | f-secure_anti-virus | 6.40 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.41 | |
f-secure | internet_gatekeeper | 6.42 | |
f-secure | internet_gatekeeper | 6.50 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.40:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "375B5B66-822B-4142-BAA3-0928DE7A8D6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.41:*:*:*:*:*:*:*", "matchCriteriaId": "05453A15-69B7-40AD-B14E-D00432DC4344", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.42:*:*:*:*:*:*:*", "matchCriteriaId": "F54C74DD-DDF7-4747-8A59-F67114412BFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.50:*:*:*:*:*:*:*", "matchCriteriaId": "905F63E8-4535-4353-A911-FDC8616F118A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the web console in F-Secure Anti-Virus for Microsoft Exchange 6.40, and Internet Gatekeeper 6.40 through 6.42 and 6.50 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors. NOTE: By default, the connections are only allowed from the local host." } ], "evaluatorSolution": "Update to a fixed version or apply hotfix.", "id": "CVE-2006-2838", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-06-06T20:06:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20407" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016196" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016197" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.f-secure.com/security/fsc-2006-3.shtml" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/2076" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26799" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.f-secure.com/security/fsc-2006-3.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/2076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26799" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-18 17:00
Modified
2025-04-11 00:51
Severity ?
Summary
F-Secure Internet Gatekeeper for Linux 3.x before 3.03 does not require authentication for reading access logs, which allows remote attackers to obtain potentially sensitive information via a TCP session on the admin UI port.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN71542734/index.html | Patch | |
vultures@jpcert.or.jp | http://jvndb.jvn.jp/jvndb/JVNDB-2011-000013 | Patch | |
vultures@jpcert.or.jp | http://osvdb.org/70898 | ||
vultures@jpcert.or.jp | http://secunia.com/advisories/43326 | Vendor Advisory | |
vultures@jpcert.or.jp | http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2011-1.html | Patch, Vendor Advisory | |
vultures@jpcert.or.jp | http://www.vupen.com/english/advisories/2011/0393 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN71542734/index.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/jvndb/JVNDB-2011-000013 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/70898 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43326 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2011-1.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0393 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | internet_gatekeeper | 3.02.1221 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:3.02.1221:*:linux:*:*:*:*:*", "matchCriteriaId": "D1E1F400-B657-41DD-A173-8CCB83D914A1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "F-Secure Internet Gatekeeper for Linux 3.x before 3.03 does not require authentication for reading access logs, which allows remote attackers to obtain potentially sensitive information via a TCP session on the admin UI port." }, { "lang": "es", "value": "F-Secure Internet Gatekeeper para Linux 3.x antes de v3.03 no requiere autenticaci\u00f3n para la lectura de registros de acceso, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una sesi\u00f3n TCP en el puerto de administraci\u00f3n de la interfaz de usuario." } ], "id": "CVE-2011-0453", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-18T17:00:46.213", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Patch" ], "url": "http://jvn.jp/en/jp/JVN71542734/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000013" }, { "source": "vultures@jpcert.or.jp", "url": "http://osvdb.org/70898" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43326" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2011-1.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://jvn.jp/en/jp/JVN71542734/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/70898" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2011-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0393" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use malformed quoting in MIME headers, parameters, and values, including (1) fields that should not be quoted, (2) duplicate quotes, or (3) missing leading or trailing quote characters, which may be interpreted differently by mail clients.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=109521027007616&w=2 | ||
cve@mitre.org | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/17336 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=109521027007616&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/17336 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use malformed quoting in MIME headers, parameters, and values, including (1) fields that should not be quoted, (2) duplicate quotes, or (3) missing leading or trailing quote characters, which may be interpreted differently by mail clients." }, { "lang": "es", "value": "M\u00faltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan entrecomillado malformado en cabeceras MIME, par\u00e1metros y valores, incluyendo (1) campos que no deber\u00edan ser entrecomillados, (2) comillas duplicadas, o (3) falta de caract\u00e9res al principio o al final, lo que puede ser interpretado de manera distinta por clientes de correo electr\u00f3nico." } ], "id": "CVE-2003-1016", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109521027007616\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109521027007616\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17336" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-05 17:15
Modified
2024-11-21 06:58
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A Denial-of-Service vulnerability was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed PE32-bit files it is possible that can crash the scanning engine. The exploit can be triggered remotely by an attacker.
References
▶ | URL | Tags | |
---|---|---|---|
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/home/support/vulnerability-reward-program/hall-of-fame | Not Applicable, Vendor Advisory | |
cve-notifications-us@f-secure.com | https://www.withsecure.com/en/expertise/people | Not Applicable, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/home/support/vulnerability-reward-program/hall-of-fame | Not Applicable, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.withsecure.com/en/expertise/people | Not Applicable, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | elements_endpoint_detection_and_response | * | |
f-secure | elements_endpoint_protection | * | |
apple | macos | - | |
microsoft | windows | - | |
f-secure | atlant | * | |
f-secure | cloud_protection_for_salesforce | * | |
f-secure | elements_collaboration_protection | * | |
f-secure | internet_gatekeeper | * | |
f-secure | linux_security | * | |
f-secure | linux_security_64 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_detection_and_response:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F97045C-E576-49D3-9630-072E26F7D64F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DFC1F94-8A8B-42E2-887B-EE8FB3C9130D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C97DC3C-1B63-4B57-8C62-ACD77D0A3E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:cloud_protection_for_salesforce:*:*:*:*:*:*:*:*", "matchCriteriaId": "31ECCE87-B67E-4CA7-91E6-8E71CEA6DA21", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_collaboration_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B107FE0-0F9E-4021-917F-1224F2619339", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "88F6E1F2-02DA-48EE-B127-4933CCC80C5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:x86:*", "matchCriteriaId": "F0152E70-F7A9-4785-8A43-78472F9A2C13", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security_64:*:*:*:*:*:*:*:*", "matchCriteriaId": "360DBC2B-2B93-461E-90C6-60C55FBD87B8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service vulnerability was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed PE32-bit files it is possible that can crash the scanning engine. The exploit can be triggered remotely by an attacker." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de denegaci\u00f3n de servicio en F-Secure Atlant y en algunos productos WithSecure durante el escaneo de archivos fuzzed PE32-bit que puede bloquear el motor de escaneo. La explotaci\u00f3n puede ser desencadenada remotamente por un atacante" } ], "id": "CVE-2022-28880", "lastModified": "2024-11-21T06:58:07.477", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.4, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-05T17:15:08.447", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "https://www.f-secure.com/en/home/support/vulnerability-reward-program/hall-of-fame" }, { "source": "cve-notifications-us@f-secure.com", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "https://www.withsecure.com/en/expertise/people" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "https://www.f-secure.com/en/home/support/vulnerability-reward-program/hall-of-fame" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "https://www.withsecure.com/en/expertise/people" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-28 10:15
Modified
2024-11-21 06:09
Severity ?
7.6 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. An authenticated user can modify settings through the web user interface in a way that could lead to an arbitrary code execution on the F-Secure Internet Gatekeeper server.
References
▶ | URL | Tags | |
---|---|---|---|
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | Vendor Advisory | |
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33601 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33601 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | internet_gatekeeper | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "936FB1DB-B0AF-4E46-AFB0-FF10D9A008DD", "versionEndIncluding": "5.50.47", "versionStartIncluding": "5.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. An authenticated user can modify settings through the web user interface in a way that could lead to an arbitrary code execution on the F-Secure Internet Gatekeeper server." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad en la interfaz de usuario web de F-Secure Internet Gatekeeper. Un usuario autenticado puede modificar la configuraci\u00f3n mediante la interfaz de usuario web de forma que podr\u00eda conllevar una ejecuci\u00f3n de c\u00f3digo arbitrario en el servidor de F-Secure Internet Gatekeeper" } ], "id": "CVE-2021-33601", "lastModified": "2024-11-21T06:09:10.783", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.5, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-28T10:15:08.167", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33601" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Heap-based buffer overflow in multiple F-Secure Anti-Virus and Internet Security products allows remote attackers to execute arbitrary code via a crafted ARJ archive.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.f-secure.com/security/fsc-2005-1.shtml | Patch | |
cve@mitre.org | http://xforce.iss.net/xforce/alerts/id/188 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/security/fsc-2005-1.shtml | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://xforce.iss.net/xforce/alerts/id/188 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | 4.60 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 2004 | |
f-secure | f-secure_anti-virus | 2005 | |
f-secure | f-secure_internet_security | 2004 | |
f-secure | f-secure_internet_security | 2005 | |
f-secure | f-secure_personal_express | * | |
f-secure | internet_gatekeeper | * | |
f-secure | internet_gatekeeper | 2.06 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "AD54BC7B-CBD8-4D02-8820-95B2167F0582", "versionEndIncluding": "4.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "6E42F017-98A7-4124-9D86-EA298F9EA25F", "versionEndIncluding": "4.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "43B1DC94-12A4-438E-8EF6-02CE3BDCD960", "versionEndIncluding": "4.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_client_security:*:*:*:*:*", "matchCriteriaId": "F18B3BB2-60F6-4E24-869C-2A411C697668", "versionEndIncluding": "5.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_server_security:*:*:*:*:*", "matchCriteriaId": "BA62B7FB-0C89-48F1-AC7C-1128702BD736", "versionEndIncluding": "5.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "D93C56CE-CFA2-40B4-9A35-7C413900EDB4", "versionEndIncluding": "5.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:workstations:*:*:*:*:*", "matchCriteriaId": "415DDB5B-7829-4971-BD1A-4C59FA930EC0", "versionEndIncluding": "5.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "315C0071-C761-4DC3-8640-E9334350C2B0", "versionEndIncluding": "5.51", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:client_security:*:*:*:*:*", "matchCriteriaId": "8D795DA7-D19B-4730-9995-E0953B858FAD", "versionEndIncluding": "5.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:firewalls:*:*:*:*:*", "matchCriteriaId": "30A6D6C5-BDFB-41A6-A941-27529CF2BDB7", "versionEndIncluding": "6.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "1B9E90E3-71D8-41B3-9E04-4DC115C16814", "versionEndIncluding": "6.31", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*", "matchCriteriaId": "C8C41338-0651-425E-A823-C8CBD91977D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:citrix_servers:*:*:*:*:*", "matchCriteriaId": "095A03CE-6B8F-4275-87BE-44E807F97939", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7F996B07-8B07-42A6-86FC-B5B55F708861", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "7C2C1784-2482-4CBE-BE6D-4519C3FB64BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "0429B86A-F228-44E8-ABBB-D57BEE3679F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "89A0FDD3-3364-4452-BD6F-EB6F85D3119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7D56465-6411-449F-BF05-B303B0EF575E", "versionEndIncluding": "5.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AAB47F1-ACE9-417F-8FB4-480A5728D598", "versionEndIncluding": "6.41", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:2.06:*:linux:*:*:*:*:*", "matchCriteriaId": "33E76051-5D4A-4C8C-A911-3B78BFEA77CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in multiple F-Secure Anti-Virus and Internet Security products allows remote attackers to execute arbitrary code via a crafted ARJ archive." } ], "id": "CVE-2005-0350", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.f-secure.com/security/fsc-2005-1.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://xforce.iss.net/xforce/alerts/id/188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.f-secure.com/security/fsc-2005-1.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://xforce.iss.net/xforce/alerts/id/188" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-26 17:15
Modified
2024-11-21 06:24
Severity ?
5.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Summary
A vulnerability affecting F-Secure antivirus engine was discovered whereby unpacking UPX file can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine.
References
▶ | URL | Tags | |
---|---|---|---|
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | Vendor Advisory | |
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40833 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40833 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | atlant | - | |
f-secure | internet_gatekeeper | - | |
f-secure | linux_security | - | |
f-secure | linux_security_64 | - | |
f-secure | elements_endpoint_protection | - | |
apple | macos | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8AF772-E3DC-4C9B-B3E8-81103D3B7BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:-:*:*:*:*:*:*:*", "matchCriteriaId": "30BDCB44-B304-4A12-86A0-4849FAB25D39", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:-:*:*:*:*:*:x86:*", "matchCriteriaId": "26113C91-7FD5-4C3B-84F7-6A986CA26461", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5E48AF8-57C4-4DFB-9E64-E3B3352941E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:-:*:*:*:*:*:*:*", "matchCriteriaId": "7098F9BA-B2C0-4310-96D5-D0134761F7A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability affecting F-Secure antivirus engine was discovered whereby unpacking UPX file can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad que afecta al motor antivirus de F-Secure por la que el desempaquetado de archivos UPX puede conllevar a una denegaci\u00f3n de servicio. La vulnerabilidad puede ser explotada remotamente por un atacante. Un ataque con \u00e9xito resultar\u00e1 en una denegaci\u00f3n de servicio del motor antivirus" } ], "id": "CVE-2021-40833", "lastModified": "2024-11-21T06:24:52.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.4, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-26T17:15:07.903", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40833" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-404" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-01-21 00:03
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allows remote attackers to execute arbitrary code via crafted ZIP archives.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/18529 | Patch, Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1015507 | ||
cve@mitre.org | http://securitytracker.com/id?1015508 | ||
cve@mitre.org | http://securitytracker.com/id?1015509 | ||
cve@mitre.org | http://securitytracker.com/id?1015510 | ||
cve@mitre.org | http://www.ciac.org/ciac/bulletins/q-103.shtml | ||
cve@mitre.org | http://www.f-secure.com/security/fsc-2006-1.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.osvdb.org/22632 | ||
cve@mitre.org | http://www.securityfocus.com/bid/16309 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2006/0257 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/24198 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/18529 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015507 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015508 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015509 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015510 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ciac.org/ciac/bulletins/q-103.shtml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/security/fsc-2006-1.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/22632 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/16309 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/0257 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/24198 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | f-secure_anti-virus | 2.16 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.61 | |
f-secure | f-secure_anti-virus | 4.61 | |
f-secure | f-secure_anti-virus | 4.62 | |
f-secure | f-secure_anti-virus | 4.64 | |
f-secure | f-secure_anti-virus | 4.64 | |
f-secure | f-secure_anti-virus | 5.0 | |
f-secure | f-secure_anti-virus | 5.0 | |
f-secure | f-secure_anti-virus | 5.01 | |
f-secure | f-secure_anti-virus | 5.01 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.11 | |
f-secure | f-secure_anti-virus | 5.11 | |
f-secure | f-secure_anti-virus | 5.40 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.43 | |
f-secure | f-secure_anti-virus | 5.44 | |
f-secure | f-secure_anti-virus | 5.51 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 5.54 | |
f-secure | f-secure_anti-virus | 5.55 | |
f-secure | f-secure_anti-virus | 5.61 | |
f-secure | f-secure_anti-virus | 6.01 | |
f-secure | f-secure_anti-virus | 6.01 | |
f-secure | f-secure_anti-virus | 6.2 | |
f-secure | f-secure_anti-virus | 6.2 | |
f-secure | f-secure_anti-virus | 6.21 | |
f-secure | f-secure_anti-virus | 6.30 | |
f-secure | f-secure_anti-virus | 6.30_sr1 | |
f-secure | f-secure_anti-virus | 6.31 | |
f-secure | f-secure_anti-virus | 6.40 | |
f-secure | f-secure_anti-virus | 2004 | |
f-secure | f-secure_anti-virus | 2005 | |
f-secure | f-secure_anti-virus | 2006 | |
f-secure | f-secure_internet_security | 2004 | |
f-secure | f-secure_internet_security | 2005 | |
f-secure | f-secure_internet_security | 2006 | |
f-secure | internet_gatekeeper | 2.06 | |
f-secure | internet_gatekeeper | 2.6 | |
f-secure | internet_gatekeeper | 2.14 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
f-secure | internet_gatekeeper | 6.41 | |
f-secure | internet_gatekeeper | 6.42 | |
f-secure | solutions_based_on_f-secure_personal_express | 6.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2.16:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "1473BDA6-ADD8-41C0-95DD-D82A1317FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "6CC9AA17-3EF4-4BC5-9E29-5A6525B9AC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "A9C60C23-FC4D-4D14-B3E3-ECD797888AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "D04E2381-68CB-455F-8878-17C8E4112C95", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "4AE00A20-8152-48D9-9AC4-EA359284E635", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "6B334073-9FF3-4F75-8702-51DB6937B7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "2D553EF0-6A08-4DD0-A301-99AADAFBFFBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "5A277838-B3AE-45E4-9E1D-005F63FB7573", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "33C62796-C9C0-485E-A58B-6510AFA80F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.62:*:samba_servers:*:*:*:*:*", "matchCriteriaId": "8A2035B9-D6DE-4091-84B0-EC73F491EC43", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "2F448567-DCAB-4B5F-B939-5B630A5A9B70", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "A49C5BE3-EF09-4B73-A8F7-95B428EB28F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:linux_client_security:*:*:*:*:*", "matchCriteriaId": "016877EA-FBDE-4E49-8077-CFFCFB8E7DFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:linux_server_security:*:*:*:*:*", "matchCriteriaId": "8CFC86C0-2E3E-4057-808C-358B4B0463F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.01:*:linux_client_security:*:*:*:*:*", "matchCriteriaId": "857DC5D0-BAE2-47DE-92A3-63F4960A8022", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.01:*:linux_server_security:*:*:*:*:*", "matchCriteriaId": "789D6655-F3FF-4F6C-BAF6-452D6ECA207B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:citrix_servers:*:*:*:*:*", "matchCriteriaId": "095A03CE-6B8F-4275-87BE-44E807F97939", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*", "matchCriteriaId": "46F72328-7B69-4A1B-A065-E65544F27A75", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "A8B5F6AF-561B-45B4-8087-D637FAB9E877", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "B7D558FE-0C41-4FC1-AF94-2CDE69FF8CD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.11:*:linux_client_security:*:*:*:*:*", "matchCriteriaId": "17C7BE07-1D72-4E06-BDD4-0281BE35CAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.11:*:linux_server_security:*:*:*:*:*", "matchCriteriaId": "FE057604-B92A-4B69-9CD5-189A33C90A45", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.40:*:workstations:*:*:*:*:*", "matchCriteriaId": "461627F0-2CEF-4623-B38E-6B30059B0B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "2BA28970-0DB9-433E-83A1-36BF05DB062A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "C0D25A1D-2B31-4B29-96FE-A793F8244F66", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:workstations:*:*:*:*:*", "matchCriteriaId": "AC90ADFD-32FE-4EA1-9583-5EFE585152CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "B490FC59-616A-4F90-95D8-50F9C0D6CB40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "858468E0-4208-4703-A3AA-4BF6CC254DDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:workstations:*:*:*:*:*", "matchCriteriaId": "4E26052D-35B8-44E7-8F66-442BA55F4483", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.43:*:workstations:*:*:*:*:*", "matchCriteriaId": "352EE11B-2385-4359-BEA1-706FEA3E9D9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.44:*:workstations:*:*:*:*:*", "matchCriteriaId": "D35E1591-553E-42F0-AE3E-16A2A5640F9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.51:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "99727375-701D-4AD9-9410-B69B7603807C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:citrix_servers:*:*:*:*:*", "matchCriteriaId": "CAB9474C-A4F9-45C0-A77C-34B794AE2262", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*", "matchCriteriaId": "CBA4A9B7-626A-4539-852F-96C49D860E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "AD772D28-E146-470A-AAD6-838587420FAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.54:*:client_security:*:*:*:*:*", "matchCriteriaId": "6D9796D5-C957-410D-96A8-7C1AC1D614A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.55:*:client_security:*:*:*:*:*", "matchCriteriaId": "94B734B9-4D8C-4195-AA01-83DDEC535BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.61:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "AEF8C12D-ADF4-4FAE-8B13-B69BFA5AFF2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:client_security:*:*:*:*:*", "matchCriteriaId": "F874EF46-3E17-4A51-A576-7E0BFE1FD4EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "1171FFA9-4898-4174-AD17-C6E47A120585", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:firewalls:*:*:*:*:*", "matchCriteriaId": "A937E670-6263-4497-B17F-1D19D48ED6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "4401535F-9AC5-4419-A6B6-9A877887A3D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "19828867-7079-4233-A3B8-BF7A3052FB8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "97610DB9-0379-4EB3-95E6-9B5C21E5A6E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30_sr1:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "5777A2C3-5EB0-495E-8E0E-94BCA86D5E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.31:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "2D43D811-F305-4709-9C43-862A7FC783B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.40:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "375B5B66-822B-4142-BAA3-0928DE7A8D6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7F996B07-8B07-42A6-86FC-B5B55F708861", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "7C2C1784-2482-4CBE-BE6D-4519C3FB64BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "9A6B8424-EED8-4A09-9A9C-FC5F76A9FAF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "0429B86A-F228-44E8-ABBB-D57BEE3679F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "89A0FDD3-3364-4452-BD6F-EB6F85D3119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C788A5AB-C847-476C-9767-C6711F2D4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:2.06:*:linux:*:*:*:*:*", "matchCriteriaId": "33E76051-5D4A-4C8C-A911-3B78BFEA77CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:2.6:*:linux:*:*:*:*:*", "matchCriteriaId": "CC709820-939F-438A-8CAD-A9D4E192C332", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:2.14:*:linux:*:*:*:*:*", "matchCriteriaId": "46AD4E4B-E01A-4CC5-8D05-14B5B6935408", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.41:*:*:*:*:*:*:*", "matchCriteriaId": "05453A15-69B7-40AD-B14E-D00432DC4344", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.42:*:*:*:*:*:*:*", "matchCriteriaId": "F54C74DD-DDF7-4747-8A59-F67114412BFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:solutions_based_on_f-secure_personal_express:6.20:*:*:*:*:*:*:*", "matchCriteriaId": "E99B3025-7A16-4AD8-A5F8-2CE2D7E3E102", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allows remote attackers to execute arbitrary code via crafted ZIP archives." } ], "id": "CVE-2006-0337", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-01-21T00:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18529" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015507" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015508" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015509" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015510" }, { "source": "cve@mitre.org", "url": "http://www.ciac.org/ciac/bulletins/q-103.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2006-1.shtml" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/22632" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/16309" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0257" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015508" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015509" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015510" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ciac.org/ciac/bulletins/q-103.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2006-1.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/22632" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24198" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-11-02 23:02
Modified
2025-04-03 01:03
Severity ?
Summary
Directory traversal vulnerability in F-Secure Anti-Virus for Microsoft Exchange 6.40 and Internet Gatekeeper 6.40 to 6.42 allows limited remote attackers to bypass Web Console authentication and read files.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/17361 | Patch, Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1015142 | ||
cve@mitre.org | http://securitytracker.com/id?1015143 | ||
cve@mitre.org | http://www.f-secure.com/security/fsc-2005-2.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/15284 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2005/2277 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17361 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015142 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015143 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/security/fsc-2005-2.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/15284 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2005/2277 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | f-secure_anti-virus | 6.40 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.41 | |
f-secure | internet_gatekeeper | 6.42 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.40:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "375B5B66-822B-4142-BAA3-0928DE7A8D6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.41:*:*:*:*:*:*:*", "matchCriteriaId": "05453A15-69B7-40AD-B14E-D00432DC4344", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.42:*:*:*:*:*:*:*", "matchCriteriaId": "F54C74DD-DDF7-4747-8A59-F67114412BFE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in F-Secure Anti-Virus for Microsoft Exchange 6.40 and Internet Gatekeeper 6.40 to 6.42 allows limited remote attackers to bypass Web Console authentication and read files." } ], "id": "CVE-2005-3468", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-11-02T23:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17361" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015142" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015143" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2005-2.shtml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/15284" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/2277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2005-2.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/15284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/2277" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-07-14 15:15
Modified
2024-11-21 06:58
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aeheur.dll component can crash the scanning engine. The exploit can be triggered remotely by an attacker.
References
▶ | URL | Tags | |
---|---|---|---|
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
cve-notifications-us@f-secure.com | https://www.withsecure.com/en/support/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.withsecure.com/en/support/security-advisories | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | atlant | * | |
f-secure | cloud_protection_for_salesforce | * | |
f-secure | elements_collaboration_protection | * | |
f-secure | internet_gatekeeper | * | |
f-secure | linux_security | * | |
f-secure | elements_endpoint_protection | * | |
apple | macos | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C97DC3C-1B63-4B57-8C62-ACD77D0A3E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:cloud_protection_for_salesforce:*:*:*:*:*:*:*:*", "matchCriteriaId": "31ECCE87-B67E-4CA7-91E6-8E71CEA6DA21", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_collaboration_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B107FE0-0F9E-4021-917F-1224F2619339", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "88F6E1F2-02DA-48EE-B127-4933CCC80C5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EBE4C11-5678-420C-ACC1-B92B095C6D1B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DFC1F94-8A8B-42E2-887B-EE8FB3C9130D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aeheur.dll component can crash the scanning engine. The exploit can be triggered remotely by an attacker." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en F-Secure Atlant y en determinados productos WithSecure por la que el escaneo del componente aeheur.dll puede bloquear el motor de escaneo. La explotaci\u00f3n puede ser desencadenado remotamente por un atacante" } ], "id": "CVE-2022-28876", "lastModified": "2024-11-21T06:58:06.980", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.4, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-14T15:15:08.040", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard separator characters, or use standard separators incorrectly, within MIME headers, fields, parameters, or values, which may be interpreted differently by mail clients.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=109517669115891&w=2 | ||
cve@mitre.org | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/17334 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=109517669115891&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/17334 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard separator characters, or use standard separators incorrectly, within MIME headers, fields, parameters, or values, which may be interpreted differently by mail clients." }, { "lang": "es", "value": "M\u00faltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan caract\u00e9res de separaci\u00f3n no est\u00e1ndar, o usan separadores est\u00e1ndar de manera incorrecta, dentro de cabeceras, campos, par\u00e1metros o valores MIME, lo que puede ser interpretado de manera diferente por clientes de correo." } ], "id": "CVE-2004-0052", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109517669115891\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109517669115891\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17334" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-05-31 23:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070522 allow remote attackers to cause a denial of service (file scanning infinite loop) via certain crafted (1) ARJ archives or (2) FSG packed files.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063714.html | ||
cve@mitre.org | http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063715.html | ||
cve@mitre.org | http://osvdb.org/36725 | ||
cve@mitre.org | http://osvdb.org/36726 | ||
cve@mitre.org | http://secunia.com/advisories/25440 | Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1018147 | ||
cve@mitre.org | http://www.f-secure.com/security/fsc-2007-3.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.nruns.com/security_advisory_fsecure_arj.php | ||
cve@mitre.org | http://www.nruns.com/security_advisory_fsecure_fsg.php | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/470462/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/470484/100/0/threaded | ||
cve@mitre.org | http://www.securitytracker.com/id?1018146 | ||
cve@mitre.org | http://www.securitytracker.com/id?1018148 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/1985 | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/34581 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063714.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063715.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/36725 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/36726 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25440 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1018147 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/security/fsc-2007-3.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.nruns.com/security_advisory_fsecure_arj.php | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.nruns.com/security_advisory_fsecure_fsg.php | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/470462/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/470484/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018146 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018148 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/1985 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/34581 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | 2005 | |
f-secure | f-secure_anti-virus | 2006 | |
f-secure | f-secure_anti-virus | 2007 | |
f-secure | f-secure_anti-virus_client_security | * | |
f-secure | f-secure_anti-virus_linux_client_security | * | |
f-secure | f-secure_anti-virus_linux_server_security | * | |
f-secure | f-secure_internet_security | 2005 | |
f-secure | f-secure_internet_security | 2006 | |
f-secure | f-secure_internet_security | 2007 | |
f-secure | f-secure_protection_service | * | |
f-secure | internet_gatekeeper | * | |
f-secure | internet_gatekeeper | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "75319428-D8AF-4863-9B55-30CD6D41DA54", "versionEndIncluding": "4.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "213E4AAB-E890-4D5A-935E-C44120729179", "versionEndIncluding": "4.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "131C7D74-C1E0-47D6-8246-5B77330F7E02", "versionEndIncluding": "5.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:workstations:*:*:*:*:*", "matchCriteriaId": "723EB35B-5E24-4901-BDB6-D16D063F9857", "versionEndIncluding": "5.44", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:citrix_servers:*:*:*:*:*", "matchCriteriaId": "22E20219-86BC-4571-9021-41DAC45B9E8F", "versionEndIncluding": "5.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "CFE0DE01-2910-49C6-AF4B-5799FEB04338", "versionEndIncluding": "5.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "E6FF2902-D9CE-477E-BF73-561B12F526FC", "versionEndIncluding": "6.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "7C2C1784-2482-4CBE-BE6D-4519C3FB64BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "9A6B8424-EED8-4A09-9A9C-FC5F76A9FAF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2007:*:*:*:*:*:*:*", "matchCriteriaId": "1106DE08-DE9A-488B-8C5D-28E353CDEEEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_client_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "52D9FF34-1EEF-4C5F-B709-927931825A36", "versionEndIncluding": "6.03", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EAD9FFA-92EF-427B-8499-47206A9EE07C", "versionEndIncluding": "5.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DE516E5-2CD5-42FC-8197-045ED44E651A", "versionEndIncluding": "5.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "89A0FDD3-3364-4452-BD6F-EB6F85D3119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C788A5AB-C847-476C-9767-C6711F2D4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2007:*:*:*:*:*:*:*", "matchCriteriaId": "3972C7F1-8B78-4A5D-8A75-C6CA01E997DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_protection_service:*:*:consumers:*:*:*:*:*", "matchCriteriaId": "CEB47D96-AAF6-4F44-833D-26224C4D1F49", "versionEndIncluding": "6.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:linux:*:*:*:*:*", "matchCriteriaId": "8972DE53-0C05-471E-B7C0-4212043B9543", "versionEndIncluding": "2.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "75FDCA01-A786-43CA-958A-62EFF8CA813E", "versionEndIncluding": "6.60", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070522 allow remote attackers to cause a denial of service (file scanning infinite loop) via certain crafted (1) ARJ archives or (2) FSG packed files." }, { "lang": "es", "value": "Varios productos antivirus de F-Secure para Microsoft Windows y Linux anterior a versi\u00f3n 20070522, permiten a los atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito de escaneo de archivos) por medio de ciertos archivos ARJ (1) o (2) archivos empaquetados FSG." } ], "id": "CVE-2007-2967", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-31T23:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063714.html" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063715.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/36725" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/36726" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25440" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018147" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2007-3.shtml" }, { "source": "cve@mitre.org", "url": "http://www.nruns.com/security_advisory_fsecure_arj.php" }, { "source": "cve@mitre.org", "url": "http://www.nruns.com/security_advisory_fsecure_fsg.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/470462/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/470484/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018146" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018148" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/1985" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063714.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063715.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36726" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018147" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2007-3.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nruns.com/security_advisory_fsecure_arj.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nruns.com/security_advisory_fsecure_fsg.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/470462/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/470484/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018146" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/1985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34581" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME encapsulation that uses RFC822 comment fields, which may be interpreted as other fields by mail clients.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=109517563513776&w=2 | ||
cve@mitre.org | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/17332 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=109517563513776&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/17332 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME encapsulation that uses RFC822 comment fields, which may be interpreted as other fields by mail clients." }, { "lang": "es", "value": "M\u00faltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante encapsulaci\u00f3n MIME que usa campos de comentarios RFC822, lo que puede ser interpretado como otros campos por clientes de correo." } ], "id": "CVE-2004-0162", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109517563513776\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109517563513776\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17332" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-09 13:15
Modified
2024-11-21 06:24
Severity ?
4.6 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Summary
A vulnerability affecting F-Secure antivirus engine before Capricorn update 2022-02-01_01 was discovered whereby decompression of ACE file causes the scanner service to stop. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine.
References
▶ | URL | Tags | |
---|---|---|---|
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40837 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40837 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | atlant | * | |
f-secure | internet_gatekeeper | * | |
f-secure | linux_security | * | |
f-secure | security_cloud | * | |
f-secure | elements_endpoint_detection_and_response | * | |
f-secure | elements_endpoint_protection | * | |
apple | macos | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C810E84-5BA2-4C76-A0B1-787DA8FD6F43", "versionEndExcluding": "2022-02-01_01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "55CED2BE-3907-486B-B929-3F23BF59C32D", "versionEndExcluding": "2022-02-01_01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0463D0C-3B1C-457A-BA24-6BB15814886B", "versionEndExcluding": "2022-02-01_01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:security_cloud:*:*:*:*:*:*:*:*", "matchCriteriaId": "418AEC01-756D-404E-A2C6-A68C174B4430", "versionEndExcluding": "2022-02-01_01", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_detection_and_response:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BBEB008-A43D-4A57-8EC6-6486ADE46ED7", "versionEndExcluding": "2022-02-01_01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "52DF86B1-BA20-41C6-A283-79915A102A53", "versionEndExcluding": "2022-02-01_01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability affecting F-Secure antivirus engine before Capricorn update 2022-02-01_01 was discovered whereby decompression of ACE file causes the scanner service to stop. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad que afecta al motor antivirus de F-Secure versiones anteriores a la actualizaci\u00f3n 2022-02-01_01 de Capricorn, por la que una descompresi\u00f3n del archivo ACE causa la detenci\u00f3n del servicio de esc\u00e1ner. La vulnerabilidad puede ser explotada de forma remota por un atacante. Un ataque con \u00e9xito resultar\u00e1 en una denegaci\u00f3n de servicio del motor antivirus" } ], "id": "CVE-2021-40837", "lastModified": "2024-11-21T06:24:53.560", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 2.5, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-09T13:15:08.527", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40837" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40837" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-28 10:15
Modified
2024-11-21 06:09
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A denial-of-service (DoS) vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. The vulnerability occurs because of an attacker can trigger assertion via malformed HTTP packet to web interface. An unauthenticated attacker could exploit this vulnerability by sending a large username parameter. A successful exploitation could lead to a denial-of-service of the product.
References
▶ | URL | Tags | |
---|---|---|---|
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | Vendor Advisory | |
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33600 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33600 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | internet_gatekeeper | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "936FB1DB-B0AF-4E46-AFB0-FF10D9A008DD", "versionEndIncluding": "5.50.47", "versionStartIncluding": "5.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A denial-of-service (DoS) vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. The vulnerability occurs because of an attacker can trigger assertion via malformed HTTP packet to web interface. An unauthenticated attacker could exploit this vulnerability by sending a large username parameter. A successful exploitation could lead to a denial-of-service of the product." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en la interfaz de usuario web de F-Secure Internet Gatekeeper. La vulnerabilidad se produce porque un atacante puede desencadenar una aserci\u00f3n por medio de un paquete HTTP malformado a la interfaz web. Un atacante no autenticado podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un par\u00e1metro de nombre de usuario grande. Una explotaci\u00f3n con \u00e9xito podr\u00eda conllevar a una denegaci\u00f3n de servicio del producto" } ], "id": "CVE-2021-33600", "lastModified": "2024-11-21T06:09:10.643", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-28T10:15:08.100", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33600" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33600" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-617" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-06 18:15
Modified
2024-11-21 06:58
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine.
References
▶ | URL | Tags | |
---|---|---|---|
cve-notifications-us@f-secure.com | https://www.withsecure.com/en/expertise/people | Vendor Advisory | |
cve-notifications-us@f-secure.com | https://www.withsecure.com/en/support/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.withsecure.com/en/expertise/people | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.withsecure.com/en/support/security-advisories | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
withsecure | business_suite | - | |
withsecure | elements_endpoint_protection | * | |
f-secure | internet_gatekeeper | - | |
f-secure | linux_security | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:withsecure:business_suite:-:*:*:*:*:*:x86:*", "matchCriteriaId": "2F2293B1-0239-4B61-86ED-92A47D8954D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:withsecure:elements_endpoint_protection:*:*:*:*:*:*:x86:*", "matchCriteriaId": "ED47159B-1F79-4C35-A6D9-4424C6B27A8D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:-:*:*:*:*:-:*:*", "matchCriteriaId": "716021F0-35B9-4567-838A-DAEC65A6601F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:-:*:*:*:*:*:x86:*", "matchCriteriaId": "26113C91-7FD5-4C3B-84F7-6A986CA26461", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de denegaci\u00f3n de servicio en los productos F-Secure y WithSecure por la que el archivo aerdl.dll puede entrar en un bucle infinito cuando desempaqueta archivos PE. Es posible que esto pueda bloquear el motor de escaneo." } ], "id": "CVE-2022-28884", "lastModified": "2024-11-21T06:58:07.980", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.4, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-06T18:15:12.907", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/expertise/people" }, { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/expertise/people" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-08 10:15
Modified
2024-11-21 06:09
Severity ?
5.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the AVPACK module component used in certain F-Secure products can crash while scanning a fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service (DoS) of the Anti-Virus engine.
References
▶ | URL | Tags | |
---|---|---|---|
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | Vendor Advisory | |
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33603 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33603 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | atlant | - | |
f-secure | cloud_protection_for_salesforce | - | |
f-secure | elements_for_microsoft_365 | - | |
f-secure | internet_gatekeeper | - | |
f-secure | linux_security | - | |
f-secure | elements_endpoint_detection_and_response | - | |
f-secure | elements_endpoint_protection | - | |
apple | macos | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8AF772-E3DC-4C9B-B3E8-81103D3B7BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:cloud_protection_for_salesforce:-:*:*:*:*:*:*:*", "matchCriteriaId": "F04F9410-836A-428B-9959-4662E79D963D", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_for_microsoft_365:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB5FAF08-98B4-46C1-890A-958860119ECF", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:-:*:*:*:*:-:*:*", "matchCriteriaId": "716021F0-35B9-4567-838A-DAEC65A6601F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEDCC601-0F8F-4D23-9DE1-5B4B72C689AE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_detection_and_response:-:*:*:*:*:*:*:*", "matchCriteriaId": "27EDA251-BB9B-4394-B653-145603D0EEA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:-:*:*:*:*:*:*:*", "matchCriteriaId": "7098F9BA-B2C0-4310-96D5-D0134761F7A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the AVPACK module component used in certain F-Secure products can crash while scanning a fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service (DoS) of the Anti-Virus engine." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de Denegaci\u00f3n de Servicio (DoS) en F-Secure Atlant por la que el componente del m\u00f3dulo AVPACK usado en determinados productos de F-Secure puede bloquearse mientras se escanean archivos con problemas. La explotaci\u00f3n puede ser desencadenada remotamente por un atacante. Un ataque con \u00e9xito resultar\u00e1 en una Denegaci\u00f3n de Servicio (DoS) del motor Antivirus" } ], "id": "CVE-2021-33603", "lastModified": "2024-11-21T06:09:11.037", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.4, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-08T10:15:07.817", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33603" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-01-21 00:03
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allow remote attackers to hide arbitrary files and data via malformed (1) RAR and (2) ZIP archives, which are not properly scanned.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/18529 | Patch, Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1015507 | ||
cve@mitre.org | http://securitytracker.com/id?1015508 | ||
cve@mitre.org | http://securitytracker.com/id?1015509 | ||
cve@mitre.org | http://securitytracker.com/id?1015510 | ||
cve@mitre.org | http://www.ciac.org/ciac/bulletins/q-103.shtml | ||
cve@mitre.org | http://www.f-secure.com/security/fsc-2006-1.shtml | Patch | |
cve@mitre.org | http://www.osvdb.org/22633 | ||
cve@mitre.org | http://www.securityfocus.com/bid/16309 | Patch | |
cve@mitre.org | http://www.vupen.com/english/advisories/2006/0257 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/24199 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/18529 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015507 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015508 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015509 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015510 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ciac.org/ciac/bulletins/q-103.shtml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/security/fsc-2006-1.shtml | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/22633 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/16309 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/0257 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/24199 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.60 | |
f-secure | f-secure_anti-virus | 4.61 | |
f-secure | f-secure_anti-virus | 4.61 | |
f-secure | f-secure_anti-virus | 4.62 | |
f-secure | f-secure_anti-virus | 4.64 | |
f-secure | f-secure_anti-virus | 4.64 | |
f-secure | f-secure_anti-virus | 5.0 | |
f-secure | f-secure_anti-virus | 5.0 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.11 | |
f-secure | f-secure_anti-virus | 5.11 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.43 | |
f-secure | f-secure_anti-virus | 5.44 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 5.55 | |
f-secure | f-secure_anti-virus | 6.01 | |
f-secure | f-secure_anti-virus | 6.01 | |
f-secure | f-secure_anti-virus | 6.2 | |
f-secure | f-secure_anti-virus | 6.2 | |
f-secure | f-secure_anti-virus | 6.21 | |
f-secure | f-secure_anti-virus | 6.30 | |
f-secure | f-secure_anti-virus | 6.30_sr1 | |
f-secure | f-secure_anti-virus | 6.31 | |
f-secure | f-secure_anti-virus | 6.40 | |
f-secure | f-secure_anti-virus | 2003 | |
f-secure | f-secure_anti-virus | 2004 | |
f-secure | f-secure_anti-virus | 2005 | |
f-secure | f-secure_internet_security | 2004 | |
f-secure | f-secure_internet_security | 2005 | |
f-secure | f-secure_internet_security | 2006 | |
f-secure | f-secure_personal_express | 4.5 | |
f-secure | f-secure_personal_express | 4.6 | |
f-secure | f-secure_personal_express | 4.7 | |
f-secure | f-secure_personal_express | 5.0 | |
f-secure | internet_gatekeeper | 2.06 | |
f-secure | internet_gatekeeper | 2.14 | |
f-secure | internet_gatekeeper | 6.32 | |
f-secure | internet_gatekeeper | 6.41 | |
f-secure | internet_gatekeeper | 6.42 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "6CC9AA17-3EF4-4BC5-9E29-5A6525B9AC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "A9C60C23-FC4D-4D14-B3E3-ECD797888AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "4AE00A20-8152-48D9-9AC4-EA359284E635", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "6B334073-9FF3-4F75-8702-51DB6937B7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "2D553EF0-6A08-4DD0-A301-99AADAFBFFBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*", "matchCriteriaId": "C8C41338-0651-425E-A823-C8CBD91977D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "5A277838-B3AE-45E4-9E1D-005F63FB7573", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "33C62796-C9C0-485E-A58B-6510AFA80F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.62:*:samba_servers:*:*:*:*:*", "matchCriteriaId": "8A2035B9-D6DE-4091-84B0-EC73F491EC43", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "2F448567-DCAB-4B5F-B939-5B630A5A9B70", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "A49C5BE3-EF09-4B73-A8F7-95B428EB28F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:linux_client_security:*:*:*:*:*", "matchCriteriaId": "016877EA-FBDE-4E49-8077-CFFCFB8E7DFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:linux_server_security:*:*:*:*:*", "matchCriteriaId": "8CFC86C0-2E3E-4057-808C-358B4B0463F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*", "matchCriteriaId": "46F72328-7B69-4A1B-A065-E65544F27A75", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "A8B5F6AF-561B-45B4-8087-D637FAB9E877", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "B7D558FE-0C41-4FC1-AF94-2CDE69FF8CD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.11:*:linux_client_security:*:*:*:*:*", "matchCriteriaId": "17C7BE07-1D72-4E06-BDD4-0281BE35CAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.11:*:linux_server_security:*:*:*:*:*", "matchCriteriaId": "FE057604-B92A-4B69-9CD5-189A33C90A45", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "2BA28970-0DB9-433E-83A1-36BF05DB062A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:workstations:*:*:*:*:*", "matchCriteriaId": "AC90ADFD-32FE-4EA1-9583-5EFE585152CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "B490FC59-616A-4F90-95D8-50F9C0D6CB40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "858468E0-4208-4703-A3AA-4BF6CC254DDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:workstations:*:*:*:*:*", "matchCriteriaId": "4E26052D-35B8-44E7-8F66-442BA55F4483", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.43:*:workstations:*:*:*:*:*", "matchCriteriaId": "352EE11B-2385-4359-BEA1-706FEA3E9D9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.44:*:workstations:*:*:*:*:*", "matchCriteriaId": "D35E1591-553E-42F0-AE3E-16A2A5640F9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:citrix_servers:*:*:*:*:*", "matchCriteriaId": "CAB9474C-A4F9-45C0-A77C-34B794AE2262", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*", "matchCriteriaId": "CBA4A9B7-626A-4539-852F-96C49D860E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "0D47BE5A-D3C9-4B97-AFB1-633AE69F911E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "AD772D28-E146-470A-AAD6-838587420FAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.55:*:client_security:*:*:*:*:*", "matchCriteriaId": "94B734B9-4D8C-4195-AA01-83DDEC535BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:client_security:*:*:*:*:*", "matchCriteriaId": "F874EF46-3E17-4A51-A576-7E0BFE1FD4EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "1171FFA9-4898-4174-AD17-C6E47A120585", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:firewalls:*:*:*:*:*", "matchCriteriaId": "A937E670-6263-4497-B17F-1D19D48ED6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "4401535F-9AC5-4419-A6B6-9A877887A3D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "19828867-7079-4233-A3B8-BF7A3052FB8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "97610DB9-0379-4EB3-95E6-9B5C21E5A6E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30_sr1:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "5777A2C3-5EB0-495E-8E0E-94BCA86D5E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.31:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "2D43D811-F305-4709-9C43-862A7FC783B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.40:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "375B5B66-822B-4142-BAA3-0928DE7A8D6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2003:*:*:*:*:*:*:*", "matchCriteriaId": "831F0C4D-C85F-46DA-BC9E-D3F56DE2B085", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7F996B07-8B07-42A6-86FC-B5B55F708861", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "7C2C1784-2482-4CBE-BE6D-4519C3FB64BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "0429B86A-F228-44E8-ABBB-D57BEE3679F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "89A0FDD3-3364-4452-BD6F-EB6F85D3119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C788A5AB-C847-476C-9767-C6711F2D4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "72DE7015-C1FF-4803-8B28-5AF5ECC3AAB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "D04F7296-3290-40D1-9CFB-E52FADAE5719", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.7:*:*:*:*:*:*:*", "matchCriteriaId": "B9A0DDB6-4B86-430E-879A-C835DBB96C42", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA95C918-917F-4A49-822C-487A07E6F91E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:2.06:*:linux:*:*:*:*:*", "matchCriteriaId": "33E76051-5D4A-4C8C-A911-3B78BFEA77CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:2.14:*:linux:*:*:*:*:*", "matchCriteriaId": "46AD4E4B-E01A-4CC5-8D05-14B5B6935408", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.41:*:*:*:*:*:*:*", "matchCriteriaId": "05453A15-69B7-40AD-B14E-D00432DC4344", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.42:*:*:*:*:*:*:*", "matchCriteriaId": "F54C74DD-DDF7-4747-8A59-F67114412BFE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allow remote attackers to hide arbitrary files and data via malformed (1) RAR and (2) ZIP archives, which are not properly scanned." } ], "id": "CVE-2006-0338", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-01-21T00:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18529" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015507" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015508" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015509" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015510" }, { "source": "cve@mitre.org", "url": "http://www.ciac.org/ciac/bulletins/q-103.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.f-secure.com/security/fsc-2006-1.shtml" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/22633" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/16309" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0257" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015508" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015509" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015510" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ciac.org/ciac/bulletins/q-103.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.f-secure.com/security/fsc-2006-1.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/22633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/16309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24199" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-25 16:15
Modified
2024-11-21 06:58
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aemobile component can crash the scanning engine. The exploit can be triggered remotely by an attacker.
References
▶ | URL | Tags | |
---|---|---|---|
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
cve-notifications-us@f-secure.com | https://www.withsecure.com/en/support/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.withsecure.com/en/support/security-advisories | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | atlant | - | |
f-secure | cloud_protection_for_salesforce | - | |
f-secure | elements_collaboration_protection | - | |
f-secure | internet_gatekeeper | - | |
f-secure | linux_security | - | |
f-secure | elements_endpoint_detection_and_response | - | |
f-secure | elements_endpoint_protection | - | |
apple | macos | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8AF772-E3DC-4C9B-B3E8-81103D3B7BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:cloud_protection_for_salesforce:-:*:*:*:*:*:*:*", "matchCriteriaId": "F04F9410-836A-428B-9959-4662E79D963D", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_collaboration_protection:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28AA80A-1FF6-4DD6-BCCB-C455C2BB5032", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:-:*:*:*:*:-:*:*", "matchCriteriaId": "716021F0-35B9-4567-838A-DAEC65A6601F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEDCC601-0F8F-4D23-9DE1-5B4B72C689AE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_detection_and_response:-:*:*:*:*:*:*:*", "matchCriteriaId": "27EDA251-BB9B-4394-B653-145603D0EEA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:-:*:*:*:*:*:*:*", "matchCriteriaId": "7098F9BA-B2C0-4310-96D5-D0134761F7A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aemobile component can crash the scanning engine. The exploit can be triggered remotely by an attacker." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de Denegaci\u00f3n de Servicio (DoS) en F-Secure Atlant y en determinados productos WithSecure por la que el escaneo del componente aemobile puede bloquear el motor de escaneo. La explotaci\u00f3n puede ser activado remotamente por un atacante" } ], "id": "CVE-2022-28875", "lastModified": "2024-11-21T06:58:06.840", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.4, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-25T16:15:08.297", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-404" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=109517788100063&w=2 | ||
cve@mitre.org | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/17337 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=109517788100063&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/17337 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients." }, { "lang": "es", "value": "M\u00faltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan valores Content-Transfer-Encoding no est\u00e1ndar pero ampliamente soportados, como (1) uuencode, (2) mac-binhex40, y (3) yenc, lo que puede ser interpretado de manera distinta por clientes de correo." } ], "id": "CVE-2004-0051", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109517788100063\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17337" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109517788100063\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17337" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-22 23:15
Modified
2024-11-21 05:40
Severity ?
Summary
The F-Secure AV parsing engine before 2020-02-05 allows virus-detection bypass via crafted Compression Method data in a GZIP archive. This affects versions before 17.0.605.474 (on Linux) of Cloud Protection For Salesforce, Email and Server Security, and Internet GateKeeper.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/156506/F-SECURE-Generic-Malformed-Container-Bypass.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://seclists.org/fulldisclosure/2020/Feb/33 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://blog.zoller.lu/p/tzo-16-2020-f-secure-generic-malformed.html | Third Party Advisory | |
cve@mitre.org | https://seclists.org/bugtraq/2020/Feb/33 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/156506/F-SECURE-Generic-Malformed-Container-Bypass.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2020/Feb/33 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.zoller.lu/p/tzo-16-2020-f-secure-generic-malformed.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2020/Feb/33 | Mailing List, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | cloud_protection_for_salesforce | * | |
f-secure | email_and_server_security | * | |
f-secure | internet_gatekeeper | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:cloud_protection_for_salesforce:*:*:*:*:*:linux_kernel:*:*", "matchCriteriaId": "40003AAB-03BE-482B-ACF2-240D6B429E55", "versionEndExcluding": "17.0.605.474", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:email_and_server_security:*:*:*:*:*:linux_kernel:*:*", "matchCriteriaId": "CADC5DB7-E6C3-46DD-B12F-1B42133F045F", "versionEndExcluding": "17.0.605.474", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:linux_kernel:*:*", "matchCriteriaId": "1269C298-14D1-42EA-9854-F60BA9EDEEC5", "versionEndExcluding": "17.0.605.474", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The F-Secure AV parsing engine before 2020-02-05 allows virus-detection bypass via crafted Compression Method data in a GZIP archive. This affects versions before 17.0.605.474 (on Linux) of Cloud Protection For Salesforce, Email and Server Security, and Internet GateKeeper." }, { "lang": "es", "value": "El motor de an\u00e1lisis de F-Secure AV antes del 05-02-2020, permite omitir la detecci\u00f3n de virus mediante datos de Compression Method dise\u00f1ados en un archivo GZIP. Esto afecta a las versiones anteriores a 17.0.605.474 (en Linux) de Cloud Protection For Salesforce, Email y Server Security, y Internet GateKeeper." } ], "id": "CVE-2020-9342", "lastModified": "2024-11-21T05:40:26.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-22T23:15:11.097", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156506/F-SECURE-Generic-Malformed-Container-Bypass.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Feb/33" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://blog.zoller.lu/p/tzo-16-2020-f-secure-generic-malformed.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2020/Feb/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156506/F-SECURE-Generic-Malformed-Container-Bypass.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Feb/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blog.zoller.lu/p/tzo-16-2020-f-secure-generic-malformed.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2020/Feb/33" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-436" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-05-31 23:30
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the Real-time Scanning component in multiple F-Secure products, including Internet Security 2005, 2006 and 2007; Anti-Virus 2005, 2006 and 2007; and Solutions based on F-Secure Protection Service for Consumers 6.40 and earlier allows local users to gain privileges via a crafted I/O request packet (IRP), related to IOCTL (Input/Output Control) and "access validation of the address space."
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://osvdb.org/36727 | ||
cve@mitre.org | http://secunia.com/advisories/25439 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.f-secure.com/security/fsc-2007-2.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securitytracker.com/id?1018146 | ||
cve@mitre.org | http://www.securitytracker.com/id?1018148 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/1985 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/34579 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/36727 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25439 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/security/fsc-2007-2.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018146 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018148 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/1985 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/34579 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | 2005 | |
f-secure | f-secure_anti-virus | 2006 | |
f-secure | f-secure_anti-virus | 2007 | |
f-secure | f-secure_anti-virus_client_security | * | |
f-secure | f-secure_anti-virus_linux_client_security | * | |
f-secure | f-secure_anti-virus_linux_server_security | * | |
f-secure | f-secure_internet_security | 2005 | |
f-secure | f-secure_internet_security | 2006 | |
f-secure | f-secure_internet_security | 2007 | |
f-secure | f-secure_protection_service | * | |
f-secure | internet_gatekeeper | * | |
f-secure | internet_gatekeeper | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "75319428-D8AF-4863-9B55-30CD6D41DA54", "versionEndIncluding": "4.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "213E4AAB-E890-4D5A-935E-C44120729179", "versionEndIncluding": "4.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "131C7D74-C1E0-47D6-8246-5B77330F7E02", "versionEndIncluding": "5.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:workstations:*:*:*:*:*", "matchCriteriaId": "723EB35B-5E24-4901-BDB6-D16D063F9857", "versionEndIncluding": "5.44", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:citrix_servers:*:*:*:*:*", "matchCriteriaId": "22E20219-86BC-4571-9021-41DAC45B9E8F", "versionEndIncluding": "5.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "CFE0DE01-2910-49C6-AF4B-5799FEB04338", "versionEndIncluding": "5.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "E6FF2902-D9CE-477E-BF73-561B12F526FC", "versionEndIncluding": "6.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "7C2C1784-2482-4CBE-BE6D-4519C3FB64BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "9A6B8424-EED8-4A09-9A9C-FC5F76A9FAF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2007:*:*:*:*:*:*:*", "matchCriteriaId": "1106DE08-DE9A-488B-8C5D-28E353CDEEEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_client_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "52D9FF34-1EEF-4C5F-B709-927931825A36", "versionEndIncluding": "6.03", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EAD9FFA-92EF-427B-8499-47206A9EE07C", "versionEndIncluding": "5.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DE516E5-2CD5-42FC-8197-045ED44E651A", "versionEndIncluding": "5.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "89A0FDD3-3364-4452-BD6F-EB6F85D3119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C788A5AB-C847-476C-9767-C6711F2D4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2007:*:*:*:*:*:*:*", "matchCriteriaId": "3972C7F1-8B78-4A5D-8A75-C6CA01E997DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_protection_service:*:*:consumers:*:*:*:*:*", "matchCriteriaId": "CEB47D96-AAF6-4F44-833D-26224C4D1F49", "versionEndIncluding": "6.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:linux:*:*:*:*:*", "matchCriteriaId": "8972DE53-0C05-471E-B7C0-4212043B9543", "versionEndIncluding": "2.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "75FDCA01-A786-43CA-958A-62EFF8CA813E", "versionEndIncluding": "6.60", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Real-time Scanning component in multiple F-Secure products, including Internet Security 2005, 2006 and 2007; Anti-Virus 2005, 2006 and 2007; and Solutions based on F-Secure Protection Service for Consumers 6.40 and earlier allows local users to gain privileges via a crafted I/O request packet (IRP), related to IOCTL (Input/Output Control) and \"access validation of the address space.\"" }, { "lang": "es", "value": "Vulnerabilidad sin especificar en el componente Real-time Scanning en m\u00faltiples productos de F-Secure, incluyendo Internet Security 2005, 2006 y2007; Anti-Virus 2005, 2006 y 2007 y Solutions basadas en F-Secure Protection Service for Consumers 6.40 y versiones anteriores permite a usuarios locales obtener privilegios a trav\u00e9s de paquetes de petici\u00f3n I/O (IRP) manipulados, relacionado con el IOCTL (Control de Entrada/Salida) y \"Validaci\u00f3n del acceso al espacio de direcciones\"." } ], "id": "CVE-2007-2965", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-31T23:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/36727" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25439" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2007-2.shtml" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018146" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018148" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1985" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2007-2.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018146" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34579" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-08-18 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html | ||
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000840 | ||
cve@mitre.org | http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html | ||
cve@mitre.org | http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html | ||
cve@mitre.org | http://marc.info/?l=bugtraq&m=108422737918885&w=2 | ||
cve@mitre.org | http://secunia.com/advisories/19514 | Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200405-02.xml | ||
cve@mitre.org | http://securitytracker.com/id?1015866 | ||
cve@mitre.org | http://www.debian.org/security/2004/dsa-515 | ||
cve@mitre.org | http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt | ||
cve@mitre.org | http://www.osvdb.org/5753 | ||
cve@mitre.org | http://www.osvdb.org/5754 | ||
cve@mitre.org | http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2004-178.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2004-179.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/10243 | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2006/1220 | Vendor Advisory | |
cve@mitre.org | https://bugzilla.fedora.us/show_bug.cgi?id=1833 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/16012 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000840 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=108422737918885&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/19514 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200405-02.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015866 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2004/dsa-515 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/5753 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/5754 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2004-178.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2004-179.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/10243 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/1220 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.fedora.us/show_bug.cgi?id=1833 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/16012 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.0 | |
clearswift | mailsweeper | 4.1 | |
clearswift | mailsweeper | 4.2 | |
clearswift | mailsweeper | 4.3 | |
clearswift | mailsweeper | 4.3.3 | |
clearswift | mailsweeper | 4.3.4 | |
clearswift | mailsweeper | 4.3.5 | |
clearswift | mailsweeper | 4.3.6 | |
clearswift | mailsweeper | 4.3.6_sp1 | |
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.60 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 6.21 | |
f-secure | f-secure_anti-virus | 2003 | |
f-secure | f-secure_anti-virus | 2004 | |
f-secure | f-secure_for_firewalls | 6.20 | |
f-secure | f-secure_internet_security | 2003 | |
f-secure | f-secure_internet_security | 2004 | |
f-secure | f-secure_personal_express | 4.5 | |
f-secure | f-secure_personal_express | 4.6 | |
f-secure | f-secure_personal_express | 4.7 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
rarlab | winrar | 3.20 | |
redhat | lha | 1.14i-9 | |
sgi | propack | 2.4 | |
sgi | propack | 3.0 | |
stalker | cgpmcafee | 3.2 | |
tsugio_okamoto | lha | 1.14 | |
tsugio_okamoto | lha | 1.15 | |
tsugio_okamoto | lha | 1.17 | |
winzip | winzip | 9.0 | |
redhat | fedora_core | core_1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFE4FA19-F2EA-4292-A441-2E4A39366942", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA5D7FD1-D5AB-4987-801A-FA464C31298A", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "772710C7-41FE-47E2-B0D7-A3C8D36C8808", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7358AD98-44C1-4CC4-BD50-CFF3822F3A96", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AAA1C283-E518-4BC6-BBF0-FCE09F9E0F17", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "5B8A74FB-07B0-42D6-ABF3-D7A073A329E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "49668AFD-4821-4D5A-BEBD-DF55A8AB58C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "57E0BFFD-D777-43A5-AEE8-765F55C86E93", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.6_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "DAF9A151-6EBF-4760-A154-A34FF7C9E632", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "6CC9AA17-3EF4-4BC5-9E29-5A6525B9AC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "A9C60C23-FC4D-4D14-B3E3-ECD797888AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "D04E2381-68CB-455F-8878-17C8E4112C95", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "4AE00A20-8152-48D9-9AC4-EA359284E635", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "6B334073-9FF3-4F75-8702-51DB6937B7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "2D553EF0-6A08-4DD0-A301-99AADAFBFFBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*", "matchCriteriaId": "C8C41338-0651-425E-A823-C8CBD91977D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*", "matchCriteriaId": "46F72328-7B69-4A1B-A065-E65544F27A75", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "2BA28970-0DB9-433E-83A1-36BF05DB062A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "C0D25A1D-2B31-4B29-96FE-A793F8244F66", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:workstations:*:*:*:*:*", "matchCriteriaId": "AC90ADFD-32FE-4EA1-9583-5EFE585152CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "B490FC59-616A-4F90-95D8-50F9C0D6CB40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "858468E0-4208-4703-A3AA-4BF6CC254DDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:workstations:*:*:*:*:*", "matchCriteriaId": "4E26052D-35B8-44E7-8F66-442BA55F4483", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*", "matchCriteriaId": "CBA4A9B7-626A-4539-852F-96C49D860E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "19828867-7079-4233-A3B8-BF7A3052FB8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2003:*:*:*:*:*:*:*", "matchCriteriaId": "831F0C4D-C85F-46DA-BC9E-D3F56DE2B085", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7F996B07-8B07-42A6-86FC-B5B55F708861", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_for_firewalls:6.20:*:*:*:*:*:*:*", "matchCriteriaId": "119D5A71-E7C2-4603-9D78-A161D82BC2D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2003:*:*:*:*:*:*:*", "matchCriteriaId": "6689D4E1-F8DC-46D9-BA35-4E4AE9C28456", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "0429B86A-F228-44E8-ABBB-D57BEE3679F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "72DE7015-C1FF-4803-8B28-5AF5ECC3AAB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "D04F7296-3290-40D1-9CFB-E52FADAE5719", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.7:*:*:*:*:*:*:*", "matchCriteriaId": "B9A0DDB6-4B86-430E-879A-C835DBB96C42", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "C1011521-AEF2-40EB-B671-66B20FF01CC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:lha:1.14i-9:*:i386:*:*:*:*:*", "matchCriteriaId": "EB59539A-8973-45C8-A553-1B524DA43937", "vulnerable": true }, { "criteria": "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0702A32E-E577-403C-B4D9-15037D7100A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "29DC217F-C257-4A3C-9CBD-08010C30BEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:stalker:cgpmcafee:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FC4CB399-2E2F-4A73-BA41-3EFB0DBDC404", "vulnerable": true }, { "criteria": "cpe:2.3:a:tsugio_okamoto:lha:1.14:*:*:*:*:*:*:*", "matchCriteriaId": "081C75A4-FDB1-4941-8276-985570632A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:tsugio_okamoto:lha:1.15:*:*:*:*:*:*:*", "matchCriteriaId": "A623BD1B-DB9A-4545-9970-E3492AA39A33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tsugio_okamoto:lha:1.17:*:*:*:*:*:*:*", "matchCriteriaId": "8984B914-9850-405C-AAE6-A7C266F13BA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:winzip:winzip:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "523ADB29-C3D5-4C06-89B6-22B5FC68C240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C84296C-2C8A-4DCD-9751-52951F8BEA9F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer basados en la pila en la funci\u00f3n get_header de header.c de LHA 1.14 utilizado en productos como Barracuda Spam Firewall, permite a atacantes remotos o a usuarios locales ejecutar c\u00f3digo arbitrario mediante nombres de fichero o de directorio largos en un archivo LHA, lo que dispara el desbordamiento cuando se prueba o se extrae un fichero." } ], "id": "CVE-2004-0234", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-08-18T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html" }, { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015866" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2004/dsa-515" }, { "source": "cve@mitre.org", "url": "http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/5753" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/5754" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10243" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/1220" }, { "source": "cve@mitre.org", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16012" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2004/dsa-515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/5753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/5754" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/1220" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-05-22 20:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/35008 | Vendor Advisory | |
cve@mitre.org | http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/34849 | ||
cve@mitre.org | http://www.securitytracker.com/id?1022170 | ||
cve@mitre.org | http://www.securitytracker.com/id?1022171 | ||
cve@mitre.org | http://www.securitytracker.com/id?1022172 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2009/1262 | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/50346 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35008 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/34849 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022170 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022171 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022172 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1262 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/50346 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | anti-virus | * | |
f-secure | anti-virus | * | |
f-secure | anti-virus | * | |
f-secure | anti-virus | * | |
f-secure | anti-virus | * | |
f-secure | anti-virus | * | |
f-secure | anti-virus | * | |
f-secure | anti-virus | * | |
f-secure | anti-virus | * | |
f-secure | anti-virus | * | |
f-secure | anti-virus | * | |
f-secure | client_security | * | |
f-secure | home_server_security | * | |
f-secure | internet_gatekeeper | * | |
f-secure | internet_gatekeeper | * | |
f-secure | internet_gatekeeper | * | |
f-secure | internet_security | * | |
f-secure | linux_security | * | |
f-secure | linux_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:linux_servers:*:*:*:*:*", "matchCriteriaId": "5AE96CC9-08DC-49F0-94C4-89810D8BFE01", "versionEndIncluding": "4.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:inux_client_security:*:*:*:*:*", "matchCriteriaId": "8651DBB2-EC4B-474E-8431-CD7252AC4862", "versionEndIncluding": "5.54", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:linux_server_security:*:*:*:*:*", "matchCriteriaId": "BD9FDABD-6F42-47E3-8424-559D5DD46EF3", "versionEndIncluding": "5.54", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:mime_sweeper:*:*:*:*:*", "matchCriteriaId": "2012AC4D-0F75-4389-9165-28930368AE4D", "versionEndIncluding": "5.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "AB4ED58A-B715-467B-A463-FB0BA3653FA2", "versionEndIncluding": "6.62", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:citrix_servers:*:*:*:*:*", "matchCriteriaId": "863CFFAF-FD5B-4150-A063-CB2851D689BF", "versionEndIncluding": "7.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "29A9B0A7-FFB2-460B-8BCB-1C7D9DD55A15", "versionEndIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "EC9E56D7-C642-46FB-8425-A3A7F22B62D2", "versionEndIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:windows_server:*:*:*:*:*", "matchCriteriaId": "E829D765-4473-4D6E-AA51-7EC44CB09A2C", "versionEndIncluding": "8.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:workstations:*:*:*:*:*", "matchCriteriaId": "ECE7F2A4-E673-4B59-BAC2-B3D01AD0E1A9", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:*:*:*:*:*:*:*", "matchCriteriaId": "732265B4-ED48-4C91-8C96-4E2A8D0DB105", "versionEndIncluding": "2009", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:client_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B1D2491-0097-40BA-9B35-AA0708A822BC", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:home_server_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "90F7894C-9891-4E09-BE4B-DCA045361D32", "versionEndIncluding": "2009", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:-:linux:*:*:*:*:*", "matchCriteriaId": "A0941F91-C6FF-492B-908C-51C46D373BB9", "versionEndIncluding": "2.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:-:linux_japanese:*:*:*:*:*", "matchCriteriaId": "C8E837C1-A444-4573-8F8E-4488D2917BD4", "versionEndIncluding": "3.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:-:windows:*:*:*:*:*", "matchCriteriaId": "06B35ABF-C401-4DF4-9935-55E797E60220", "versionEndIncluding": "6.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ECC7480-20F5-453B-A417-BB2B7BD198E4", "versionEndIncluding": "2009", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD234E72-8306-4262-A12A-1B5E18B34E90", "versionEndIncluding": "7.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "162C76E3-5AB6-4C72-A47A-F2820ED8BF46", "versionEndIncluding": "7.02", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive." }, { "lang": "es", "value": "M\u00faltiples productos antivirus F-Secure, incluidos: Anti-Virus for Microsoft Exchange v7.10 y anteriores; Internet Gatekeeper for Windows v6.61 y anteriores, Windows v6.61 y anteriores, y Linux v2.16 y anteriores; Internet Security 2009 y anteriores, Anti-Virus 2009 y anteriores, Client Security v8.0 y anteriores y otros; permiten a atacantes remotos saltar la detecci\u00f3n de software malicioso mediante archivos (1) .ZIP y (2) .RAR manipulados." } ], "id": "CVE-2009-1782", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-05-22T20:30:00.877", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35008" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34849" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022170" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022171" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022172" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1262" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34849" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50346" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-07-22 16:15
Modified
2024-11-21 06:58
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A Denial-of-Service vulnerability was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed APK file it is possible that can crash the scanning engine.
References
▶ | URL | Tags | |
---|---|---|---|
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
cve-notifications-us@f-secure.com | https://www.withsecure.com/en/support/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.withsecure.com/en/support/security-advisories | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | elements_endpoint_protection | - | |
apple | macos | - | |
microsoft | windows | - | |
f-secure | atlant | - | |
f-secure | cloud_protection_for_salesforce | - | |
f-secure | elements_collaboration_protection | - | |
f-secure | internet_gatekeeper | - | |
f-secure | linux_security | - | |
f-secure | linux_security_64 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:-:*:*:*:*:*:*:*", "matchCriteriaId": "7098F9BA-B2C0-4310-96D5-D0134761F7A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8AF772-E3DC-4C9B-B3E8-81103D3B7BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:cloud_protection_for_salesforce:-:*:*:*:*:*:*:*", "matchCriteriaId": "F04F9410-836A-428B-9959-4662E79D963D", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_collaboration_protection:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28AA80A-1FF6-4DD6-BCCB-C455C2BB5032", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:-:*:*:*:*:-:*:*", "matchCriteriaId": "716021F0-35B9-4567-838A-DAEC65A6601F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:-:*:*:*:*:*:x86:*", "matchCriteriaId": "26113C91-7FD5-4C3B-84F7-6A986CA26461", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5E48AF8-57C4-4DFB-9E64-E3B3352941E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service vulnerability was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed APK file it is possible that can crash the scanning engine." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de denegaci\u00f3n de servicio en F-Secure Atlant y en determinados productos WithSecure al escanear el archivo APK fuzzed es posible que pueda bloquear el motor de escaneo" } ], "id": "CVE-2022-28878", "lastModified": "2024-11-21T06:58:07.227", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.4, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-22T16:15:08.193", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-23 19:15
Modified
2025-05-22 19:15
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Summary
A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.so/aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine
References
▶ | URL | Tags | |
---|---|---|---|
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
cve-notifications-us@f-secure.com | https://www.withsecure.com/en/support/security-advisories | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.withsecure.com/en/support/security-advisories | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | cloud_protection_for_salesforce | * | |
f-secure | collaboration_protection | * | |
f-secure | elements_endpoint_protection | * | |
f-secure | internet_gatekeeper | - | |
f-secure | linux_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:cloud_protection_for_salesforce:*:*:*:*:*:*:*:*", "matchCriteriaId": "31ECCE87-B67E-4CA7-91E6-8E71CEA6DA21", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:collaboration_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FA15CDF-797E-49A0-9643-686EF1B4F5AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:windows:x86:*", "matchCriteriaId": "30FE3885-E51D-44DD-A5D8-0795AE3830BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:-:*:*:*:*:*:*:*", "matchCriteriaId": "30BDCB44-B304-4A12-86A0-4849FAB25D39", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:x86:*", "matchCriteriaId": "F0152E70-F7A9-4785-8A43-78472F9A2C13", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.so/aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine" }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de denegaci\u00f3n de servicio en los productos F-Secure y WithSecure en la que el archivo aerdl.so/aerdl.dll puede entrar en un bucle infinito cuando son desempaquetados archivos PE. Es posible que esto pueda bloquear el motor de escaneo" } ], "id": "CVE-2022-28886", "lastModified": "2025-05-22T19:15:29.937", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.4, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-23T19:15:11.447", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "cve-notifications-us@f-secure.com", "tags": [ "Third Party Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2005-11-16 07:42
Modified
2025-04-03 01:03
Severity ?
Summary
suid.cgi scripts in F-Secure (1) Internet Gatekeeper for Linux before 2.15.484 and (2) Anti-Virus Linux Gateway before 2.16 are installed SUID with world-executable permissions, which allows local users to gain privilege.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/17467 | Patch, Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1015159 | ||
cve@mitre.org | http://securitytracker.com/id?1015160 | ||
cve@mitre.org | http://www.f-secure.com/security/fsc-2005-3.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.osvdb.org/20513 | ||
cve@mitre.org | http://www.osvdb.org/20537 | ||
cve@mitre.org | http://www.osvdb.org/20538 | ||
cve@mitre.org | http://www.osvdb.org/20539 | ||
cve@mitre.org | http://www.osvdb.org/20540 | ||
cve@mitre.org | http://www.osvdb.org/20541 | ||
cve@mitre.org | http://www.osvdb.org/20542 | ||
cve@mitre.org | http://www.osvdb.org/20543 | ||
cve@mitre.org | http://www.osvdb.org/20544 | ||
cve@mitre.org | http://www.osvdb.org/20545 | ||
cve@mitre.org | http://www.osvdb.org/20546 | ||
cve@mitre.org | http://www.osvdb.org/20547 | ||
cve@mitre.org | http://www.osvdb.org/20548 | ||
cve@mitre.org | http://www.osvdb.org/20549 | ||
cve@mitre.org | http://www.osvdb.org/20550 | ||
cve@mitre.org | http://www.osvdb.org/20551 | ||
cve@mitre.org | http://www.osvdb.org/20552 | ||
cve@mitre.org | http://www.securityfocus.com/bid/15339 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2005/2331 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/22966 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17467 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015159 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015160 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/security/fsc-2005-3.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20513 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20537 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20538 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20539 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20540 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20541 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20542 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20543 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20544 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20545 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20546 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20547 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20548 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20549 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20550 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20551 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20552 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/15339 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2005/2331 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/22966 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | f-secure_anti-virus | * | |
f-secure | internet_gatekeeper | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "F83DDDED-51E8-43DE-BBA8-4AD36F920BF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:linux:*:*:*:*:*", "matchCriteriaId": "A4C973E1-597B-4D5C-B8AA-DCCEE4FC3480", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "suid.cgi scripts in F-Secure (1) Internet Gatekeeper for Linux before 2.15.484 and (2) Anti-Virus Linux Gateway before 2.16 are installed SUID with world-executable permissions, which allows local users to gain privilege." }, { "lang": "es", "value": "Los scritps suid.cgi en F-Secure (1) Internet Gatekeeper para Linux anteriores a 2.15.484 y (2) Anti-Virus Linux Gateway anteriores a 2.16 son instalados con SUID y con permiso de ejecuci\u00f3n para todo el mundo, lo que permite a usuarios locales ganar privilegios.\r\n" } ], "id": "CVE-2005-3546", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-11-16T07:42:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17467" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015159" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015160" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2005-3.shtml" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20513" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20537" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20538" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20539" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20540" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20541" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20542" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20543" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20544" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20545" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20546" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20547" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20548" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20549" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20550" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20551" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20552" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/15339" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/2331" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17467" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015160" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2005-3.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20513" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20537" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20539" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20540" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20542" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20547" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20548" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20549" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20550" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20551" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20552" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/15339" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/2331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22966" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use multiple MIME fields with the same name, which may be interpreted differently by mail clients.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=109517732328759&w=2 | ||
cve@mitre.org | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/17333 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=109517732328759&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/17333 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": false }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": false }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": false }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": false }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": false }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": false }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": false }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": false }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": false }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": false }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use multiple MIME fields with the same name, which may be interpreted differently by mail clients." }, { "lang": "es", "value": "M\u00faltiples pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan m\u00faltiples campos MIME con el mismo nombre, lo que puede ser interpretado de manera distinta por clientes de correo." } ], "id": "CVE-2003-1014", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109517732328759\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109517732328759\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17333" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use fields that use RFC2047 encoding, which may be interpreted differently by mail clients.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=109520704408739&w=2 | ||
cve@mitre.org | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/17331 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=109520704408739&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/17331 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use fields that use RFC2047 encoding, which may be interpreted differently by mail clients." }, { "lang": "es", "value": "M\u00faltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan campos con codificaci\u00f3n RFC2047, lo que puede ser interpretado de manera diferente por clientes de correo." } ], "id": "CVE-2004-0053", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109520704408739\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109520704408739\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17331" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-06 10:15
Modified
2024-11-21 06:09
Severity ?
5.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Summary
A vulnerability affecting the F-Secure Antivirus engine was discovered when the engine tries to unpack a zip archive (LZW decompression method), and this can crash the scanning engine. The vulnerability can be exploited remotely by an attacker. A successful attack will result in Denial-of-Service of the Anti-Virus engine.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | atlant | * | |
f-secure | cloud_protection | * | |
f-secure | internet_gatekeeper | * | |
f-secure | linux_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C97DC3C-1B63-4B57-8C62-ACD77D0A3E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:cloud_protection:*:*:*:*:*:salesforce:*:*", "matchCriteriaId": "A1A84F73-7263-4B3E-85E8-8595FD64A948", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "88F6E1F2-02DA-48EE-B127-4933CCC80C5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EBE4C11-5678-420C-ACC1-B92B095C6D1B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability affecting the F-Secure Antivirus engine was discovered when the engine tries to unpack a zip archive (LZW decompression method), and this can crash the scanning engine. The vulnerability can be exploited remotely by an attacker. A successful attack will result in Denial-of-Service of the Anti-Virus engine." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad que afecta al motor de F-Secure Antivirus cuando el motor intenta descomprimir un archivo zip (m\u00e9todo de descompresi\u00f3n LZW), y esto puede bloquear el motor de an\u00e1lisis. La vulnerabilidad puede ser explotada remotamente por un atacante. Un ataque con \u00e9xito resultar\u00e1 en una Denegaci\u00f3n de Servicio del motor Antivirus" } ], "id": "CVE-2021-33602", "lastModified": "2024-11-21T06:09:10.913", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.4, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-06T10:15:07.823", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use whitespace in an unusual fashion, which may be interpreted differently by mail clients.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=109525252118936&w=2 | ||
cve@mitre.org | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/9273 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=109525252118936&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/9273 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use whitespace in an unusual fashion, which may be interpreted differently by mail clients." }, { "lang": "es", "value": "M\u00faltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan espacios en blanco de manera inusual, lo que puede ser interpretado diferentemente por clientes de correo." } ], "id": "CVE-2003-1015", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109525252118936\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109525252118936\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9273" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-08 10:15
Modified
2024-11-21 06:24
Severity ?
5.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the AVRDL unpacking module component used in certain F-Secure products can crash while scanning a fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service (DoS) of the Anti-Virus engine.
References
▶ | URL | Tags | |
---|---|---|---|
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | Vendor Advisory | |
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40832 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40832 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | atlant | - | |
f-secure | cloud_protection_for_salesforce | - | |
f-secure | elements_for_microsoft_365 | - | |
f-secure | internet_gatekeeper | - | |
f-secure | linux_security | - | |
f-secure | elements_endpoint_detection_and_response | - | |
f-secure | elements_endpoint_protection | - | |
apple | macos | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8AF772-E3DC-4C9B-B3E8-81103D3B7BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:cloud_protection_for_salesforce:-:*:*:*:*:*:*:*", "matchCriteriaId": "F04F9410-836A-428B-9959-4662E79D963D", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_for_microsoft_365:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB5FAF08-98B4-46C1-890A-958860119ECF", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:-:*:*:*:*:-:*:*", "matchCriteriaId": "716021F0-35B9-4567-838A-DAEC65A6601F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEDCC601-0F8F-4D23-9DE1-5B4B72C689AE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_detection_and_response:-:*:*:*:*:*:*:*", "matchCriteriaId": "27EDA251-BB9B-4394-B653-145603D0EEA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:-:*:*:*:*:*:*:*", "matchCriteriaId": "7098F9BA-B2C0-4310-96D5-D0134761F7A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the AVRDL unpacking module component used in certain F-Secure products can crash while scanning a fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service (DoS) of the Anti-Virus engine." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de Denegaci\u00f3n de Servicio (DoS) en F-Secure Atlant, por la que el componente del m\u00f3dulo de desempaquetado AVRDL usado en determinados productos de F-Secure puede bloquearse mientras se escanean archivos con problemas. La explotaci\u00f3n puede ser desencadenada remotamente por un atacante. Un ataque con \u00e9xito resultar\u00e1 en una Denegaci\u00f3n de Servicio (DoS) del motor Antivirus" } ], "id": "CVE-2021-40832", "lastModified": "2024-11-21T06:24:52.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.4, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-08T10:15:07.890", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40832" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use RFC2231 encoding, which may be interpreted differently by mail clients.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=109524928232568&w=2 | ||
cve@mitre.org | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/9274 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=109524928232568&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.uniras.gov.uk/vuls/2004/380375/mime.htm | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/9274 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use RFC2231 encoding, which may be interpreted differently by mail clients." }, { "lang": "es", "value": "M\u00faltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan codificicaci\u00f3n RFC2231, lo que puede ser interpretado de forma variable por clientes de correo." } ], "id": "CVE-2004-0161", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109524928232568\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109524928232568\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9274" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-15 21:30
Modified
2025-04-11 00:51
Severity ?
Summary
F-Secure Internet Security 2010 and earlier; Anti-Virus for Microsoft Exchange 9 and earlier, and for MIMEsweeper 5.61 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, and for Linux 4.02 and earlier; Anti-Virus 2010 and earlier; Home Server Security 2009; Protection Service for Consumers 9 and earlier, for Business - Workstation security 9 and earlier, for Business - Server Security 8 and earlier, and for E-mail and Server security 9 and earlier; Mac Protection build 8060 and earlier; Client Security 9 and earlier; and various Anti-Virus products for Windows, Linux, and Citrix; does not properly detect malware in crafted (1) 7Z, (2) GZIP, (3) CAB, or (4) RAR archives, which makes it easier for remote attackers to avoid detection.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/39396 | Vendor Advisory | |
cve@mitre.org | http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securitytracker.com/id?1023841 | ||
cve@mitre.org | http://www.securitytracker.com/id?1023842 | ||
cve@mitre.org | http://www.securitytracker.com/id?1023843 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2010/0855 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39396 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1023841 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1023842 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1023843 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0855 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | anti-virus | * | |
f-secure | anti-virus | 6.62 | |
f-secure | anti-virus | 7.0 | |
f-secure | anti-virus | 7.10 | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | 2.16 | |
f-secure | f-secure_anti-virus | 2.16 | |
f-secure | f-secure_anti-virus | 4.50 | |
f-secure | f-secure_anti-virus | 4.50 | |
f-secure | f-secure_anti-virus | 4.50_hotfix_1 | |
f-secure | f-secure_anti-virus | 4.50_hotfix_1 | |
f-secure | f-secure_anti-virus | 4.50_hotfix_2 | |
f-secure | f-secure_anti-virus | 4.50_hotfix_2 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.51 | |
f-secure | f-secure_anti-virus | 4.51_hotfix_2 | |
f-secure | f-secure_anti-virus | 4.51_hotfix_2 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.52 | |
f-secure | f-secure_anti-virus | 4.60 | |
f-secure | f-secure_anti-virus | 4.60 | |
f-secure | f-secure_anti-virus | 4.61 | |
f-secure | f-secure_anti-virus | 4.61 | |
f-secure | f-secure_anti-virus | 4.61 | |
f-secure | f-secure_anti-virus | 4.62 | |
f-secure | f-secure_anti-virus | 4.62 | |
f-secure | f-secure_anti-virus | 4.64 | |
f-secure | f-secure_anti-virus | 4.64 | |
f-secure | f-secure_anti-virus | 4.64 | |
f-secure | f-secure_anti-virus | 4.65 | |
f-secure | f-secure_anti-virus | 4.65 | |
f-secure | f-secure_anti-virus | 4.65 | |
f-secure | f-secure_anti-virus | 5.0 | |
f-secure | f-secure_anti-virus | 5.0 | |
f-secure | f-secure_anti-virus | 5.0 | |
f-secure | f-secure_anti-virus | 5.0.2 | |
f-secure | f-secure_anti-virus | 5.01 | |
f-secure | f-secure_anti-virus | 5.01 | |
f-secure | f-secure_anti-virus | 5.01 | |
f-secure | f-secure_anti-virus | 5.2.1 | |
f-secure | f-secure_anti-virus | 5.3.0 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.5 | |
f-secure | f-secure_anti-virus | 5.11 | |
f-secure | f-secure_anti-virus | 5.11 | |
f-secure | f-secure_anti-virus | 5.11 | |
f-secure | f-secure_anti-virus | 5.40 | |
f-secure | f-secure_anti-virus | 5.40 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.41 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.42 | |
f-secure | f-secure_anti-virus | 5.43 | |
f-secure | f-secure_anti-virus | 5.43 | |
f-secure | f-secure_anti-virus | 5.44 | |
f-secure | f-secure_anti-virus | 5.44 | |
f-secure | f-secure_anti-virus | 5.51 | |
f-secure | f-secure_anti-virus | 5.51 | |
f-secure | f-secure_anti-virus | 5.51 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 5.52 | |
f-secure | f-secure_anti-virus | 5.54 | |
f-secure | f-secure_anti-virus | 5.54 | |
f-secure | f-secure_anti-virus | 5.55 | |
f-secure | f-secure_anti-virus | 5.55 | |
f-secure | f-secure_anti-virus | 5.56 | |
f-secure | f-secure_anti-virus | 5.61 | |
f-secure | f-secure_anti-virus | 5.61 | |
f-secure | f-secure_anti-virus | 6.01 | |
f-secure | f-secure_anti-virus | 6.01 | |
f-secure | f-secure_anti-virus | 6.01 | |
f-secure | f-secure_anti-virus | 6.02 | |
f-secure | f-secure_anti-virus | 6.2 | |
f-secure | f-secure_anti-virus | 6.02 | |
f-secure | f-secure_anti-virus | 6.2 | |
f-secure | f-secure_anti-virus | 6.2 | |
f-secure | f-secure_anti-virus | 6.03 | |
f-secure | f-secure_anti-virus | 6.03 | |
f-secure | f-secure_anti-virus | 6.21 | |
f-secure | f-secure_anti-virus | 6.21 | |
f-secure | f-secure_anti-virus | 6.30 | |
f-secure | f-secure_anti-virus | 6.30 | |
f-secure | f-secure_anti-virus | 6.30_sr1 | |
f-secure | f-secure_anti-virus | 6.30_sr1 | |
f-secure | f-secure_anti-virus | 6.31 | |
f-secure | f-secure_anti-virus | 6.31 | |
f-secure | f-secure_anti-virus | 6.40 | |
f-secure | f-secure_anti-virus | 6.40 | |
f-secure | f-secure_anti-virus | 6.60 | |
f-secure | f-secure_anti-virus | 6.60 | |
f-secure | f-secure_anti-virus | 6.61 | |
f-secure | f-secure_anti-virus | 6.61 | |
f-secure | f-secure_anti-virus | 7.00 | |
f-secure | f-secure_anti-virus | 7.00 | |
f-secure | f-secure_anti-virus | 7.00 | |
f-secure | f-secure_anti-virus | 7.00 | |
f-secure | f-secure_anti-virus | 7.00 | |
f-secure | f-secure_anti-virus | 7.02 | |
f-secure | f-secure_anti-virus | 2003 | |
f-secure | f-secure_anti-virus | 2004 | |
f-secure | f-secure_anti-virus | 2005 | |
f-secure | f-secure_anti-virus | 2006 | |
f-secure | f-secure_anti-virus | 2007 | |
f-secure | f-secure_anti-virus | 2007 | |
f-secure | f-secure_anti-virus | 2007 | |
f-secure | f-secure_anti-virus | 2008 | |
f-secure | f-secure_anti-virus | 2009 | |
f-secure | f-secure_anti-virus_client_security | * | |
f-secure | f-secure_anti-virus_client_security | 6.03 | |
f-secure | f-secure_anti-virus_client_security | 6.04 | |
f-secure | f-secure_anti-virus_client_security | 7.01 | |
f-secure | f-secure_anti-virus_client_security | 7.10 | |
f-secure | f-secure_anti-virus_for_citrix_servers | 7.00 | |
f-secure | f-secure_anti-virus_for_linux | * | |
f-secure | f-secure_anti-virus_for_linux | 4.65 | |
f-secure | f-secure_anti-virus_for_microsoft_exchange | 6.62 | |
f-secure | f-secure_anti-virus_for_microsoft_exchange | 7.00 | |
f-secure | f-secure_anti-virus_for_microsoft_exchange | 7.10 | |
f-secure | f-secure_anti-virus_for_mimesweeper | 5.61 | |
f-secure | f-secure_anti-virus_for_windows_servers | 8.00 | |
f-secure | f-secure_anti-virus_for_workstations | * | |
f-secure | f-secure_anti-virus_for_workstations | 5.44 | |
f-secure | f-secure_anti-virus_for_workstations | 7.00 | |
f-secure | f-secure_anti-virus_for_workstations | 7.10 | |
f-secure | f-secure_anti-virus_for_workstations | 7.11 | |
f-secure | f-secure_anti-virus_linux_client_security | * | |
f-secure | f-secure_anti-virus_linux_client_security | 5.30 | |
f-secure | f-secure_anti-virus_linux_client_security | 5.52 | |
f-secure | f-secure_anti-virus_linux_client_security | 5.53 | |
f-secure | f-secure_anti-virus_linux_client_security | 5.54 | |
f-secure | f-secure_anti-virus_linux_server_security | * | |
f-secure | f-secure_anti-virus_linux_server_security | 5.30 | |
f-secure | f-secure_anti-virus_linux_server_security | 5.52 | |
f-secure | f-secure_anti-virus_linux_server_security | 5.54 | |
f-secure | f-secure_internet_security | * | |
f-secure | f-secure_internet_security | * | |
f-secure | f-secure_internet_security | 7.02 | |
f-secure | f-secure_internet_security | 2003 | |
f-secure | f-secure_internet_security | 2004 | |
f-secure | f-secure_internet_security | 2005 | |
f-secure | f-secure_internet_security | 2006 | |
f-secure | f-secure_internet_security | 2007 | |
f-secure | f-secure_internet_security | 2007 | |
f-secure | f-secure_internet_security | 2007 | |
f-secure | f-secure_internet_security | 2008 | |
f-secure | f-secure_internet_security | 2009 | |
f-secure | home_server_security | 2009 | |
f-secure | internet_gatekeeper | * | |
f-secure | internet_gatekeeper | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "8584A696-5D15-4D14-A2C2-E0821844FB78", "versionEndIncluding": "9.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:6.62:-:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "F073E513-A598-4421-936B-6264122CFB81", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:7.0:-:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "6136A4CA-E833-43AF-8D32-B0DB3D812E56", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:7.10:-:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "30602BA3-9043-4E51-9457-16D8D1464EA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:*:*:*:*:*:*", "matchCriteriaId": "E805B40A-9534-4215-9F8B-D533C06666AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "F83DDDED-51E8-43DE-BBA8-4AD36F920BF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:*:*:*:*:*:*", "matchCriteriaId": "53919A2E-99A6-4896-9B23-F8DEA62FB006", "versionEndIncluding": "2010", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2.16:*:*:*:*:*:*:*", "matchCriteriaId": "C586FEDB-4335-47FF-81C0-301F5CD80799", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2.16:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "1473BDA6-ADD8-41C0-95DD-D82A1317FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.50:*:*:*:*:*:*:*", "matchCriteriaId": "B91DB04A-B6AA-4FDA-B3A1-9E46EC27078D", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.50:*:linux:*:*:*:*:*", "matchCriteriaId": "55C7A7CD-1BAB-475A-BEC1-3AFD15366103", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.50_hotfix_1:*:*:*:*:*:*:*", "matchCriteriaId": "7D80681B-B124-4797-BD0C-C137C189C8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.50_hotfix_1:*:linux:*:*:*:*:*", "matchCriteriaId": "8C7F4E22-8609-4111-A588-BBA6CFBE3EB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.50_hotfix_2:*:*:*:*:*:*:*", "matchCriteriaId": "137DBA10-602D-4D34-8AC1-998AD1229820", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.50_hotfix_2:*:linux:*:*:*:*:*", "matchCriteriaId": "0AB5C071-A13A-4E32-9F40-E41B47D053BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:*:*:*:*:*:*", "matchCriteriaId": "D606B8B1-C3A7-4110-8610-23FC8E90B30F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "6CC9AA17-3EF4-4BC5-9E29-5A6525B9AC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "A9C60C23-FC4D-4D14-B3E3-ECD797888AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "D04E2381-68CB-455F-8878-17C8E4112C95", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51_hotfix_2:*:*:*:*:*:*:*", "matchCriteriaId": "A60DEC4D-FD5B-41B3-9BEB-3EF0641C0F05", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51_hotfix_2:*:linux:*:*:*:*:*", "matchCriteriaId": "DF853D24-E54D-4B0C-B78B-B1EBF29A3481", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:*:*:*:*:*:*", "matchCriteriaId": "8E705203-E0A9-4F66-8393-926958DF1A59", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux:*:*:*:*:*", "matchCriteriaId": "59824214-B535-400D-9614-797F61F81062", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "4AE00A20-8152-48D9-9AC4-EA359284E635", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "6B334073-9FF3-4F75-8702-51DB6937B7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "2D553EF0-6A08-4DD0-A301-99AADAFBFFBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:*:*:*:*:*:*", "matchCriteriaId": "698A033B-181B-4BD6-9004-BA120D84EE31", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*", "matchCriteriaId": "C8C41338-0651-425E-A823-C8CBD91977D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:*:*:*:*:*:*", "matchCriteriaId": "ADA02414-2DD5-4AC2-963E-8B98BAB128B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "5A277838-B3AE-45E4-9E1D-005F63FB7573", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "33C62796-C9C0-485E-A58B-6510AFA80F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.62:*:*:*:*:*:*:*", "matchCriteriaId": "EAFCD75B-B0FA-4811-AC26-2FFC217D17B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.62:*:samba_servers:*:*:*:*:*", "matchCriteriaId": "8A2035B9-D6DE-4091-84B0-EC73F491EC43", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:*:*:*:*:*:*", "matchCriteriaId": "BB5F8A5E-5C5B-4C2D-A69E-671D03AEABF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "2F448567-DCAB-4B5F-B939-5B630A5A9B70", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "A49C5BE3-EF09-4B73-A8F7-95B428EB28F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.65:*:*:*:*:*:*:*", "matchCriteriaId": "EC9A3CF8-E32C-4C60-91B1-A4C651437F00", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.65:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "46D73A43-3FBF-422D-B3CF-136F4B7A9A5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.65:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "58668CA2-425C-470E-BA2A-E791EEED6046", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "C51DBF04-31F1-42C7-9442-559A0AF52CA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:linux_client_security:*:*:*:*:*", "matchCriteriaId": "016877EA-FBDE-4E49-8077-CFFCFB8E7DFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:linux_server_security:*:*:*:*:*", "matchCriteriaId": "8CFC86C0-2E3E-4057-808C-358B4B0463F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D8549318-DCD7-420A-AAD6-CE1D7E167E20", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.01:*:*:*:*:*:*:*", "matchCriteriaId": "30E93E69-FE42-4E90-9306-C3A9A6CAAE2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.01:*:linux_client_security:*:*:*:*:*", "matchCriteriaId": "857DC5D0-BAE2-47DE-92A3-63F4960A8022", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.01:*:linux_server_security:*:*:*:*:*", "matchCriteriaId": "789D6655-F3FF-4F6C-BAF6-452D6ECA207B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6BB606BE-CCA7-41BF-AB9F-E7C362FBADA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E92D04F2-5029-445C-ADF5-4FCC11E658BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "04041776-EA80-406D-BCAF-EAD1F6FAD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:citrix_servers:*:*:*:*:*", "matchCriteriaId": "095A03CE-6B8F-4275-87BE-44E807F97939", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*", "matchCriteriaId": "46F72328-7B69-4A1B-A065-E65544F27A75", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "A8B5F6AF-561B-45B4-8087-D637FAB9E877", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "B7D558FE-0C41-4FC1-AF94-2CDE69FF8CD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.11:*:*:*:*:*:*:*", "matchCriteriaId": "D0E0A121-7894-4E38-9295-3A4BFB8B8749", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.11:*:linux_client_security:*:*:*:*:*", "matchCriteriaId": "17C7BE07-1D72-4E06-BDD4-0281BE35CAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.11:*:linux_server_security:*:*:*:*:*", "matchCriteriaId": "FE057604-B92A-4B69-9CD5-189A33C90A45", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.40:*:*:*:*:*:*:*", "matchCriteriaId": "71DDEE06-C625-44F5-8D39-156088563F64", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.40:*:workstations:*:*:*:*:*", "matchCriteriaId": "461627F0-2CEF-4623-B38E-6B30059B0B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:*:*:*:*:*:*", "matchCriteriaId": "216282DF-8055-4691-93C7-8152B2F761BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:file_servers:*:*:*:*:*", "matchCriteriaId": "9528ACFA-2A1C-4292-BDB6-93041E9CE97E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "2BA28970-0DB9-433E-83A1-36BF05DB062A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "C0D25A1D-2B31-4B29-96FE-A793F8244F66", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:workstations:*:*:*:*:*", "matchCriteriaId": "AC90ADFD-32FE-4EA1-9583-5EFE585152CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:*:*:*:*:*:*", "matchCriteriaId": "510A1602-D3D1-4CCE-9FB8-29D8F4E05924", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:file_servers:*:*:*:*:*", "matchCriteriaId": "035181DB-9366-42A7-B783-3E8415FA8FBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "B490FC59-616A-4F90-95D8-50F9C0D6CB40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "858468E0-4208-4703-A3AA-4BF6CC254DDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:workstations:*:*:*:*:*", "matchCriteriaId": "4E26052D-35B8-44E7-8F66-442BA55F4483", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.43:*:*:*:*:*:*:*", "matchCriteriaId": "15D9B8B6-1B7E-4FB1-85CD-695C39927463", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.43:*:workstations:*:*:*:*:*", "matchCriteriaId": "352EE11B-2385-4359-BEA1-706FEA3E9D9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "5F5C145F-C336-4FD0-8262-2CBDE3FBA12B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.44:*:workstations:*:*:*:*:*", "matchCriteriaId": "D35E1591-553E-42F0-AE3E-16A2A5640F9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.51:*:*:*:*:*:*:*", "matchCriteriaId": "CBDF39BC-ED88-4E49-97A5-4E2B7BB001F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.51:*:citrix_servers:*:*:*:*:*", "matchCriteriaId": "2CFD7DE5-37B0-4AA9-8026-D13EFA31DDA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.51:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "99727375-701D-4AD9-9410-B69B7603807C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "112A4C41-3201-4BDA-BC08-355A4B9C2347", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:citrix_servers:*:*:*:*:*", "matchCriteriaId": "CAB9474C-A4F9-45C0-A77C-34B794AE2262", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*", "matchCriteriaId": "CBA4A9B7-626A-4539-852F-96C49D860E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "0D47BE5A-D3C9-4B97-AFB1-633AE69F911E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "AD772D28-E146-470A-AAD6-838587420FAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.54:*:*:*:*:*:*:*", "matchCriteriaId": "38F12483-2AAA-4269-BE97-65E80CE09C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.54:*:client_security:*:*:*:*:*", "matchCriteriaId": "6D9796D5-C957-410D-96A8-7C1AC1D614A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.55:*:*:*:*:*:*:*", "matchCriteriaId": "F44D5E36-58AC-417E-91F0-C7F9D4B8D34B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.55:*:client_security:*:*:*:*:*", "matchCriteriaId": "94B734B9-4D8C-4195-AA01-83DDEC535BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.56:*:*:*:*:*:*:*", "matchCriteriaId": "9EDFA260-07D3-463D-BDAA-4C6F9F4D52FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.61:*:*:*:*:*:*:*", "matchCriteriaId": "1EBB5C76-E785-4A1D-A855-21F346ABA3B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.61:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "AEF8C12D-ADF4-4FAE-8B13-B69BFA5AFF2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:*:*:*:*:*:*", "matchCriteriaId": "86D92D81-A2F8-47F0-8A79-2318A19D9CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:client_security:*:*:*:*:*", "matchCriteriaId": "F874EF46-3E17-4A51-A576-7E0BFE1FD4EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "1171FFA9-4898-4174-AD17-C6E47A120585", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "5145EA79-BB99-4DF6-82CD-539AFBE393CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F2F1F7D7-2F21-46EC-8991-F565556AFDAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.02:*:client_security:*:*:*:*:*", "matchCriteriaId": "995DCFD5-5745-48E6-BC0E-B8AE3F194CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:firewalls:*:*:*:*:*", "matchCriteriaId": "A937E670-6263-4497-B17F-1D19D48ED6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "4401535F-9AC5-4419-A6B6-9A877887A3D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "366ED344-85B2-418D-90E6-19B27260B465", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.03:*:client_security:*:*:*:*:*", "matchCriteriaId": "2B5FC2F8-A355-4964-B908-0DCC00734BB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:*:*:*:*:*:*", "matchCriteriaId": "C35B56AC-3C96-43C4-88D0-FAB97C3C28BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "19828867-7079-4233-A3B8-BF7A3052FB8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30:*:*:*:*:*:*:*", "matchCriteriaId": "18A8AA65-9B9E-419C-9D1C-D5A88778D8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "97610DB9-0379-4EB3-95E6-9B5C21E5A6E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30_sr1:*:*:*:*:*:*:*", "matchCriteriaId": "FC32B19D-E275-4D63-A9CA-403D7B87DD9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30_sr1:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "5777A2C3-5EB0-495E-8E0E-94BCA86D5E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "CBCFE4AA-9E83-442B-89F9-413BBA5A31F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.31:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "2D43D811-F305-4709-9C43-862A7FC783B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.40:*:*:*:*:*:*:*", "matchCriteriaId": "4F78CC67-B3AA-4503-9F49-7E605C230816", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.40:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "375B5B66-822B-4142-BAA3-0928DE7A8D6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.60:*:*:*:*:*:*:*", "matchCriteriaId": "410D9937-4480-482C-A672-8F578EF1F0D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.60:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "3F1CCFFE-4745-46BE-840F-F658245A6058", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.61:*:*:*:*:*:*:*", "matchCriteriaId": "EBB2803F-8685-4803-9C93-E9D4A672D333", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.61:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "880E04C0-42C2-4261-92D1-CF83133567F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:*:*:*:*:*:*", "matchCriteriaId": "163EACA6-64CC-4554-BE19-52AB02D1F67D", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:client_security:*:*:*:*:*", "matchCriteriaId": "D990AE62-7B09-4DA8-ADB7-3CBA2DF18683", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "C2BF5C8E-D1C4-4082-AFBE-8A8413CE1392", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "BED6F056-D9E2-4799-A432-DC07F8154AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:workstations:*:*:*:*:*", "matchCriteriaId": "4382A281-75F3-455C-B7EF-8514531C17C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.02:*:*:*:*:*:*:*", "matchCriteriaId": "B028C22E-399E-4A90-9673-64E4D510273E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2003:*:*:*:*:*:*:*", "matchCriteriaId": "831F0C4D-C85F-46DA-BC9E-D3F56DE2B085", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7F996B07-8B07-42A6-86FC-B5B55F708861", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "7C2C1784-2482-4CBE-BE6D-4519C3FB64BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "9A6B8424-EED8-4A09-9A9C-FC5F76A9FAF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2007:*:*:*:*:*:*:*", "matchCriteriaId": "1106DE08-DE9A-488B-8C5D-28E353CDEEEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2007:*:second:*:*:*:*:*", "matchCriteriaId": "62204373-31FA-4F28-AA22-D4D6F3B80F9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2007:second_edition:*:*:*:*:*:*", "matchCriteriaId": "C8609465-1436-4F50-B7EE-0DF9DA7AA4CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2008:*:*:*:*:*:*:*", "matchCriteriaId": "B47EC4EB-268A-4BB9-820D-AA3DB8D1A655", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2009:*:*:*:*:*:*:*", "matchCriteriaId": "4B68C319-313F-4CA5-9B37-D9860071E763", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_client_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA805B86-7E74-4E27-A06D-41F86FDFAAA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_client_security:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "85517B0C-8C1A-4306-8466-2C138AD0709A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_client_security:6.04:*:*:*:*:*:*:*", "matchCriteriaId": "F0657810-2CB9-4887-8AA2-3E0927937820", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_client_security:7.01:*:*:*:*:*:*:*", "matchCriteriaId": "59FA86FF-A114-44EB-884A-766BEE17FD5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_client_security:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "5CD2B3CE-78CC-4BE7-80EB-25675371B5CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_citrix_servers:7.00:*:*:*:*:*:*:*", "matchCriteriaId": "3776E315-E935-4422-A3F3-F6D261DFDB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3346E2B-C289-41A2-80B6-D8DA7697CC32", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_linux:4.65:*:*:*:*:*:*:*", "matchCriteriaId": "04102648-2C1C-420E-BBF7-5C948F0EE479", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_microsoft_exchange:6.62:*:*:*:*:*:*:*", "matchCriteriaId": "D622E750-A9AB-4EF3-BC2F-D7C3FFE8C961", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_microsoft_exchange:7.00:*:*:*:*:*:*:*", "matchCriteriaId": "85EEA770-211A-4568-BB9F-9FE76D7BFCB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_microsoft_exchange:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "06C05AE3-5003-44B0-BAFB-F5081373994F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_mimesweeper:5.61:*:*:*:*:*:*:*", "matchCriteriaId": "C03EB725-E91E-4CA3-A903-0CD45D7EE2F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_windows_servers:8.00:*:*:*:*:*:*:*", "matchCriteriaId": "6FC68767-4F85-4D80-AB6C-38A3362144A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_workstations:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F7B8FE8-8458-4C38-8FE6-6A7BEA28EB0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_workstations:5.44:*:*:*:*:*:*:*", "matchCriteriaId": "9848B969-A0A4-4F38-9C6C-79395EFF8254", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_workstations:7.00:*:*:*:*:*:*:*", "matchCriteriaId": "605AB820-8069-430A-89AC-3E0122EB3B96", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_workstations:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "7D9F9488-8DA8-48A9-9A11-B5E0D7AA9A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_workstations:7.11:*:*:*:*:*:*:*", "matchCriteriaId": "8C775FD8-A757-41A6-BBC3-29BC9D2D12A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F1BF1F7-8570-46A8-BDFE-43720C44576E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "9523BF6D-AF64-4CFE-B017-695B6BB175C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "E77AB622-B899-46FD-9DFA-1964B57A9458", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:5.53:*:*:*:*:*:*:*", "matchCriteriaId": "F8DB2DD7-86DC-440A-B8D9-0A84034E808F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:5.54:*:*:*:*:*:*:*", "matchCriteriaId": "A1E53728-0B65-48C4-A812-8915BFC5A51A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F433148-3A0B-4F84-B4FB-A8EFFCB22EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:5.30:*:*:*:*:*:*:*", "matchCriteriaId": "66AB396E-475C-404F-BEE1-66DE9C3A7555", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:5.52:*:*:*:*:*:*:*", "matchCriteriaId": "D0E6FC4F-F768-43FF-9627-DF41CD7D799C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:5.54:*:*:*:*:*:*:*", "matchCriteriaId": "105743CC-1365-404D-9B3D-0CDBFDF4BB33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "8900048F-8EAB-4BF7-98C1-57F8DA49AF06", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "A53E8102-9A65-45FD-AFDE-25861BC49B7B", "versionEndIncluding": "2010", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:7.02:*:*:*:*:*:*:*", "matchCriteriaId": "89DC5D86-0C4A-4F94-83A2-DB21B868ACCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2003:*:*:*:*:*:*:*", "matchCriteriaId": "6689D4E1-F8DC-46D9-BA35-4E4AE9C28456", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "0429B86A-F228-44E8-ABBB-D57BEE3679F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "89A0FDD3-3364-4452-BD6F-EB6F85D3119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C788A5AB-C847-476C-9767-C6711F2D4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2007:*:*:*:*:*:*:*", "matchCriteriaId": "3972C7F1-8B78-4A5D-8A75-C6CA01E997DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2007:*:second:*:*:*:*:*", "matchCriteriaId": "94858828-3626-4654-AB6A-597A49C79284", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2007:second_edition:*:*:*:*:*:*", "matchCriteriaId": "C0DCADF7-B044-4646-B215-52685609ED49", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2008:*:*:*:*:*:*:*", "matchCriteriaId": "08ED9945-DC9F-4F4F-B2EB-B63986BCC7D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2009:*:*:*:*:*:*:*", "matchCriteriaId": "D77467E5-A143-4720-93EE-29B399417065", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:home_server_security:2009:*:*:*:*:*:*:*", "matchCriteriaId": "5399311C-0418-45CA-9FED-082D9B484D68", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:-:linux:*:*:*:*:*", "matchCriteriaId": "1312B800-FE46-4D50-82E8-76201A8C3228", "versionEndIncluding": "4.02", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:-:windows:*:*:*:*:*", "matchCriteriaId": "06B35ABF-C401-4DF4-9935-55E797E60220", "versionEndIncluding": "6.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "F-Secure Internet Security 2010 and earlier; Anti-Virus for Microsoft Exchange 9 and earlier, and for MIMEsweeper 5.61 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, and for Linux 4.02 and earlier; Anti-Virus 2010 and earlier; Home Server Security 2009; Protection Service for Consumers 9 and earlier, for Business - Workstation security 9 and earlier, for Business - Server Security 8 and earlier, and for E-mail and Server security 9 and earlier; Mac Protection build 8060 and earlier; Client Security 9 and earlier; and various Anti-Virus products for Windows, Linux, and Citrix; does not properly detect malware in crafted (1) 7Z, (2) GZIP, (3) CAB, or (4) RAR archives, which makes it easier for remote attackers to avoid detection." }, { "lang": "es", "value": "F-Secure Internet Security 2010 y anteriores; Anti-Virus para Microsoft Exchange 9 y anteriores, y para MIMEsweeper v5.61 y anteriores; Internet Gatekeeper para Windows v6.61 y anteriores, y para Linux v4.02 y anteriores; Anti-Virus 2010 y anteriores; Home Server Security 2009; Protection Service para Consumers 9 y anteriores, para Business - Workstation security 9 y anteriores, para Business - Server Security 8 y anteriores, y para E-mail y Server security 9 y anteriores; Mac Protection build 8060 y anteriores; Client Security 9 y anteriores; y varios productos Anti-Virus para Windows, Linux, y Citrix no detectan adecuadamente malware en archivos (1) 7Z, (2) GZIP, (3) CAB, o (4) RAR manipulados, lo que facilita a atacantes evitar la detecci\u00f3n." } ], "id": "CVE-2010-1425", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-15T21:30:00.383", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39396" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.html" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1023841" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1023842" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1023843" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0855" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0855" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-10 20:15
Modified
2024-11-21 06:58
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the aerdl.dll component used in certain WithSecure products unpacker function crashes which leads to scanning engine crash. The exploit can be triggered remotely by an attacker.
References
▶ | URL | Tags | |
---|---|---|---|
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
cve-notifications-us@f-secure.com | https://www.withsecure.com/en/support/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.withsecure.com/en/support/security-advisories | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | elements_endpoint_detection_and_response | * | |
f-secure | elements_endpoint_protection | * | |
apple | macos | - | |
microsoft | windows | - | |
f-secure | atlant | * | |
f-secure | cloud_protection_for_salesforce | * | |
f-secure | elements_collaboration_protection | * | |
f-secure | internet_gatekeeper | * | |
f-secure | linux_security | * | |
f-secure | linux_security_64 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_detection_and_response:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F97045C-E576-49D3-9630-072E26F7D64F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DFC1F94-8A8B-42E2-887B-EE8FB3C9130D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C97DC3C-1B63-4B57-8C62-ACD77D0A3E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:cloud_protection_for_salesforce:*:*:*:*:*:*:*:*", "matchCriteriaId": "31ECCE87-B67E-4CA7-91E6-8E71CEA6DA21", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_collaboration_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B107FE0-0F9E-4021-917F-1224F2619339", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "88F6E1F2-02DA-48EE-B127-4933CCC80C5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:x86:*", "matchCriteriaId": "F0152E70-F7A9-4785-8A43-78472F9A2C13", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security_64:*:*:*:*:*:*:*:*", "matchCriteriaId": "360DBC2B-2B93-461E-90C6-60C55FBD87B8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the aerdl.dll component used in certain WithSecure products unpacker function crashes which leads to scanning engine crash. The exploit can be triggered remotely by an attacker." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de Denegaci\u00f3n de Servicio (DoS) en F-Secure Atlant por la que el componente aerdl.dll usado en determinados productos WithSecure es bloqueado, lo que conlleva a un bloqueo del motor de escaneo. La explotaci\u00f3n puede ser desencadenada remotamente por un atacante" } ], "id": "CVE-2022-28881", "lastModified": "2024-11-21T06:58:07.600", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.4, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-10T20:15:32.953", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-22 12:15
Modified
2024-11-21 06:24
Severity ?
4.6 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Summary
A vulnerability affecting F-Secure antivirus engine was discovered whereby scanning MS outlook .pst files can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | atlant | * | |
f-secure | internet_gatekeeper | * | |
f-secure | linux_security | * | |
f-secure | linux_security_64 | * | |
f-secure | elements_endpoint_detection_and_response | * | |
f-secure | elements_endpoint_protection | * | |
apple | macos | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C97DC3C-1B63-4B57-8C62-ACD77D0A3E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "88F6E1F2-02DA-48EE-B127-4933CCC80C5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:x86:*", "matchCriteriaId": "F0152E70-F7A9-4785-8A43-78472F9A2C13", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security_64:*:*:*:*:*:*:*:*", "matchCriteriaId": "360DBC2B-2B93-461E-90C6-60C55FBD87B8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_detection_and_response:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F97045C-E576-49D3-9630-072E26F7D64F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DFC1F94-8A8B-42E2-887B-EE8FB3C9130D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability affecting F-Secure antivirus engine was discovered whereby scanning MS outlook .pst files can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad que afecta al motor antivirus de F-Secure por la que el an\u00e1lisis de archivos .pst de MS outlook puede conllevar a una denegaci\u00f3n de servicio. La vulnerabilidad puede ser explotada remotamente por un atacante. Un ataque con \u00e9xito resultar\u00e1 en una denegaci\u00f3n de servicio del motor antivirus. Corregido en la actualizaci\u00f3n Capricorn 13-12-2021_07" } ], "id": "CVE-2021-40836", "lastModified": "2024-11-21T06:24:53.407", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 2.5, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-22T12:15:07.827", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-12 18:15
Modified
2025-05-15 19:15
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Multiple Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aerdl.dll unpacker handler function crashes. This can lead to a possible scanning engine crash.
References
▶ | URL | Tags | |
---|---|---|---|
cve-notifications-us@f-secure.com | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
cve-notifications-us@f-secure.com | https://www.withsecure.com/en/support/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/business/support-and-downloads/security-advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.withsecure.com/en/support/security-advisories | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | elements_endpoint_detection_and_response | - | |
f-secure | elements_endpoint_protection | - | |
apple | macos | - | |
microsoft | windows | - | |
f-secure | atlant | - | |
f-secure | internet_gatekeeper | - | |
f-secure | linux_security | - | |
f-secure | linux_security_64 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_detection_and_response:-:*:*:*:*:*:*:*", "matchCriteriaId": "27EDA251-BB9B-4394-B653-145603D0EEA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:-:*:*:*:*:*:*:*", "matchCriteriaId": "7098F9BA-B2C0-4310-96D5-D0134761F7A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8AF772-E3DC-4C9B-B3E8-81103D3B7BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:-:*:*:*:*:-:*:*", "matchCriteriaId": "716021F0-35B9-4567-838A-DAEC65A6601F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:-:*:*:*:*:*:x86:*", "matchCriteriaId": "26113C91-7FD5-4C3B-84F7-6A986CA26461", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5E48AF8-57C4-4DFB-9E64-E3B3352941E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Denial-of-Service (DoS) vulnerability was discovered in F-Secure \u0026 WithSecure products whereby the aerdl.dll unpacker handler function crashes. This can lead to a possible scanning engine crash." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad m\u00faltiple de Denegaci\u00f3n de Servicio (DoS) en los productos F-Secure y WithSecure por la que la funci\u00f3n del administrador de desempaquetado aerdl.dll es bloqueada. Esto puede conllevar a un posible fallo del motor de escaneo" } ], "id": "CVE-2022-28887", "lastModified": "2025-05-15T19:15:54.643", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.4, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-12T18:15:09.417", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-404" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2007-05-31 23:30
Modified
2025-04-09 00:30
Severity ?
Summary
Buffer overflow in the LHA decompression component in F-Secure anti-virus products for Microsoft Windows and Linux before 20070529 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted LHA archive, related to an integer wrap, a similar issue to CVE-2006-4335.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://osvdb.org/36724 | ||
cve@mitre.org | http://secunia.com/advisories/25426 | Patch, Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1018147 | ||
cve@mitre.org | http://www.f-secure.com/security/fsc-2007-1.shtml | Patch, Vendor Advisory | |
cve@mitre.org | http://www.nruns.com/security_advisory_fsecure_lzh.php | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/470256/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/24235 | ||
cve@mitre.org | http://www.securitytracker.com/id?1018146 | ||
cve@mitre.org | http://www.securitytracker.com/id?1018148 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/1985 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/34575 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/36724 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25426 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1018147 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.f-secure.com/security/fsc-2007-1.shtml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.nruns.com/security_advisory_fsecure_lzh.php | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/470256/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/24235 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018146 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018148 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/1985 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/34575 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | * | |
f-secure | f-secure_anti-virus | 2005 | |
f-secure | f-secure_anti-virus | 2006 | |
f-secure | f-secure_anti-virus | 2007 | |
f-secure | f-secure_anti-virus_client_security | * | |
f-secure | f-secure_anti-virus_linux_client_security | * | |
f-secure | f-secure_anti-virus_linux_server_security | * | |
f-secure | f-secure_internet_security | 2005 | |
f-secure | f-secure_internet_security | 2006 | |
f-secure | f-secure_internet_security | 2007 | |
f-secure | f-secure_protection_service | * | |
f-secure | internet_gatekeeper | * | |
f-secure | internet_gatekeeper | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "75319428-D8AF-4863-9B55-30CD6D41DA54", "versionEndIncluding": "4.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "213E4AAB-E890-4D5A-935E-C44120729179", "versionEndIncluding": "4.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "131C7D74-C1E0-47D6-8246-5B77330F7E02", "versionEndIncluding": "5.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:workstations:*:*:*:*:*", "matchCriteriaId": "723EB35B-5E24-4901-BDB6-D16D063F9857", "versionEndIncluding": "5.44", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:citrix_servers:*:*:*:*:*", "matchCriteriaId": "22E20219-86BC-4571-9021-41DAC45B9E8F", "versionEndIncluding": "5.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "CFE0DE01-2910-49C6-AF4B-5799FEB04338", "versionEndIncluding": "5.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "E6FF2902-D9CE-477E-BF73-561B12F526FC", "versionEndIncluding": "6.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "7C2C1784-2482-4CBE-BE6D-4519C3FB64BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "9A6B8424-EED8-4A09-9A9C-FC5F76A9FAF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2007:*:*:*:*:*:*:*", "matchCriteriaId": "1106DE08-DE9A-488B-8C5D-28E353CDEEEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_client_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "52D9FF34-1EEF-4C5F-B709-927931825A36", "versionEndIncluding": "6.03", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EAD9FFA-92EF-427B-8499-47206A9EE07C", "versionEndIncluding": "5.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DE516E5-2CD5-42FC-8197-045ED44E651A", "versionEndIncluding": "5.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "89A0FDD3-3364-4452-BD6F-EB6F85D3119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C788A5AB-C847-476C-9767-C6711F2D4EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2007:*:*:*:*:*:*:*", "matchCriteriaId": "3972C7F1-8B78-4A5D-8A75-C6CA01E997DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_protection_service:*:*:consumers:*:*:*:*:*", "matchCriteriaId": "CEB47D96-AAF6-4F44-833D-26224C4D1F49", "versionEndIncluding": "6.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:linux:*:*:*:*:*", "matchCriteriaId": "8972DE53-0C05-471E-B7C0-4212043B9543", "versionEndIncluding": "2.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "75FDCA01-A786-43CA-958A-62EFF8CA813E", "versionEndIncluding": "6.60", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the LHA decompression component in F-Secure anti-virus products for Microsoft Windows and Linux before 20070529 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted LHA archive, related to an integer wrap, a similar issue to CVE-2006-4335." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer en el componente de descompresi\u00f3n LHA en productos antivirus de F-Secure para Microsoft Windows y Linux anterior a versi\u00f3n 20070529, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (bloqueo de la aplicaci\u00f3n) por medio de un archivo LHA ??creado, relacionado con un ajuste de entero, un problema similar a CVE-2006-4335." } ], "id": "CVE-2007-2966", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-31T23:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/36724" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25426" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018147" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2007-1.shtml" }, { "source": "cve@mitre.org", "url": "http://www.nruns.com/security_advisory_fsecure_lzh.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/470256/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24235" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018146" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018148" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1985" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34575" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36724" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018147" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/security/fsc-2007-1.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nruns.com/security_advisory_fsecure_lzh.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/470256/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018146" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34575" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-23 16:15
Modified
2024-11-21 06:58
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aegen.dll will go into an infinite loop when unpacking PE files. This eventually leads to scanning engine crash. The exploit can be triggered remotely by an attacker.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | elements_endpoint_protection | * | |
apple | macos | - | |
microsoft | windows | - | |
f-secure | atlant | * | |
f-secure | cloud_protection_for_salesforce | * | |
f-secure | elements_collaboration_protection | * | |
f-secure | internet_gatekeeper | * | |
f-secure | linux_security | * | |
f-secure | linux_security_64 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DFC1F94-8A8B-42E2-887B-EE8FB3C9130D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:atlant:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C97DC3C-1B63-4B57-8C62-ACD77D0A3E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:cloud_protection_for_salesforce:*:*:*:*:*:*:*:*", "matchCriteriaId": "31ECCE87-B67E-4CA7-91E6-8E71CEA6DA21", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:elements_collaboration_protection:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B107FE0-0F9E-4021-917F-1224F2619339", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:*:*:*:*:*:*:*", "matchCriteriaId": "88F6E1F2-02DA-48EE-B127-4933CCC80C5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:x86:*", "matchCriteriaId": "F0152E70-F7A9-4785-8A43-78472F9A2C13", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security_64:*:*:*:*:*:*:*:*", "matchCriteriaId": "360DBC2B-2B93-461E-90C6-60C55FBD87B8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure \u0026 WithSecure products whereby the aegen.dll will go into an infinite loop when unpacking PE files. This eventually leads to scanning engine crash. The exploit can be triggered remotely by an attacker." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en los productos F-Secure y WithSecure por la que el archivo aegen.dll entra en un bucle infinito cuando desempaqueta archivos PE. Esto conlleva finalmente a un bloqueo del motor de escaneo. La explotaci\u00f3n puede ser desencadenada remotamente por un atacante." } ], "id": "CVE-2022-28882", "lastModified": "2024-11-21T06:58:07.733", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.4, "source": "cve-notifications-us@f-secure.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-23T16:15:10.237", "references": [ { "source": "cve-notifications-us@f-secure.com", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.withsecure.com/en/support/security-advisories" } ], "sourceIdentifier": "cve-notifications-us@f-secure.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }