CVE-2006-5647 (GCVE-0-2006-5647)
Vulnerability from cvelistv5
Published
2006-11-01 15:00
Modified
2024-08-07 19:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka "CHM name length memory consumption vulnerability."
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:55:53.925Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "name": "1017132", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017132" }, { "name": "ADV-2006-4239", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4239" }, { "name": "20816", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20816" }, { "name": "20061208 Sophos Antivirus CHM Chunk Name Length Memory Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451" }, { "name": "22591", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22591" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka \"CHM name length memory consumption vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-12-11T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "name": "1017132", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017132" }, { "name": "ADV-2006-4239", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4239" }, { "name": "20816", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20816" }, { "name": "20061208 Sophos Antivirus CHM Chunk Name Length Memory Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451" }, { "name": "22591", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22591" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5647", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka \"CHM name length memory consumption vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.sophos.com/support/knowledgebase/article/7609.html", "refsource": "CONFIRM", "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "name": "1017132", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017132" }, { "name": "ADV-2006-4239", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4239" }, { "name": "20816", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20816" }, { "name": "20061208 Sophos Antivirus CHM Chunk Name Length Memory Corruption Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451" }, { "name": "22591", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22591" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5647", "datePublished": "2006-11-01T15:00:00", "dateReserved": "2006-11-01T00:00:00", "dateUpdated": "2024-08-07T19:55:53.925Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2006-5647\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-11-01T15:07:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka \\\"CHM name length memory consumption vulnerability.\\\"\"},{\"lang\":\"es\",\"value\":\"Sophos Anti-Virus y Endpoint Security versiones anteriores a 6.0.5, Anti-Virus para Linux anteriores a 5.0.10, y otras plataformas anteriores a 4.11 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n o agotamiento de memoria) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un fichero CHM mal formado con manipulaciones concretas del segmento de cabecera CHM, tambi\u00e9n conocido como \\\"vulnerabilidad de agotamiento de memoria en longitud de nombre CHM\\\".\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:P\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D9D6E1E-9FA4-4BA1-8648-2E1A6A8FC4CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"799249AD-3E8A-4584-A680-A3E618B5372D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"587205B1-322E-478D-9B46-8F20F371C87C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9B6B5D4-E335-4377-8D98-87656522D056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ED1228F-0733-42D9-853A-B1EB4EB20A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"136B6228-D71B-4985-B555-5ABC38EF2B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4518D58D-BD49-4E02-AB93-B1B45B774F2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A398BC60-0F67-4A32-A6CD-F3410D81834F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55D2CFB6-F135-40B5-ACF8-D6513C0AB682\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B781BEA-E3D6-4260-913F-99D46DCC97D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D7952D2-2FE4-44E3-B964-976964CFFB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0AF1DE9-A0A1-4193-9AD9-56BF39F3557A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE7CC4E8-C039-4895-A3EF-BF1927266744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67E8DF83-4F1B-4E4C-A613-EF0C4502FA5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:anti-virus:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08FACDD3-92A8-4325-AD0D-81100BA81F7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sophos:endpoint_security:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.04\",\"matchCriteriaId\":\"39B0A565-0E33-419F-B209-7F87CB7AC702\"}]}]}],\"references\":[{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/22591\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1017132\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/20816\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.sophos.com/support/knowledgebase/article/7609.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4239\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22591\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1017132\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/20816\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.sophos.com/support/knowledgebase/article/7609.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4239\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…