fkie_cve-2007-4578
Vulnerability from fkie_nvd
Published
2007-08-28 18:17
Modified
2025-04-09 00:30
Severity ?
Summary
Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an "integer cast around". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sophos | anti-virus | 3.4.6 | |
sophos | anti-virus | 3.78 | |
sophos | anti-virus | 3.78d | |
sophos | anti-virus | 3.79 | |
sophos | anti-virus | 3.80 | |
sophos | anti-virus | 3.81 | |
sophos | anti-virus | 3.82 | |
sophos | anti-virus | 3.83 | |
sophos | anti-virus | 3.84 | |
sophos | anti-virus | 3.85 | |
sophos | anti-virus | 3.86 | |
sophos | anti-virus | 3.90 | |
sophos | anti-virus | 3.91 | |
sophos | anti-virus | 3.95 | |
sophos | anti-virus | 3.96.0 | |
sophos | anti-virus | 4.03 | |
sophos | anti-virus | 4.04 | |
sophos | anti-virus | 4.05 | |
sophos | anti-virus | 4.5.3 | |
sophos | anti-virus | 4.5.4 | |
sophos | anti-virus | 4.5.11 | |
sophos | anti-virus | 4.5.12 | |
sophos | anti-virus | 4.7.1 | |
sophos | anti-virus | 4.7.2 | |
sophos | anti-virus | 5.0.1 | |
sophos | anti-virus | 5.0.2 | |
sophos | anti-virus | 5.0.4 | |
sophos | anti-virus | 5.0.9 | |
sophos | anti-virus | 5.0.9 | |
sophos | anti-virus | 5.1 | |
sophos | anti-virus | 5.2 | |
sophos | anti-virus | 5.2.1 | |
sophos | anti-virus | 6.5 | |
sophos | scanning_engine | 2.30.4 | |
sophos | scanning_engine | 2.40.2 | |
sophos | small_business_suite | 4.04 | |
sophos | small_business_suite | 4.05 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:anti-virus:3.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E45839C3-4753-4D22-8FA7-9B0DF6C93414", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.78:*:*:*:*:*:*:*", "matchCriteriaId": "8DF9F90F-3E38-496F-A84A-45FC60B7613E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.78d:*:*:*:*:*:*:*", "matchCriteriaId": "A27F909C-E84F-466F-BB40-D43A0570B9C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.79:*:*:*:*:*:*:*", "matchCriteriaId": "76354221-841C-443C-921A-6242BF875918", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.80:*:*:*:*:*:*:*", "matchCriteriaId": "245520DD-FDA3-4470-94C9-4A351D028BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.81:*:*:*:*:*:*:*", "matchCriteriaId": "147AF135-4638-4015-B1C1-411611C3FC86", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.82:*:*:*:*:*:*:*", "matchCriteriaId": "9BAAFDEA-B08E-4BA9-9333-DFDC35B00D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.83:*:*:*:*:*:*:*", "matchCriteriaId": "C4E27696-23CE-4ADD-9859-B0CB1DF02E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.84:*:*:*:*:*:*:*", "matchCriteriaId": "44F9357C-2CFC-4866-8D22-E5BE48182D98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.85:*:*:*:*:*:*:*", "matchCriteriaId": "19A98770-8AF2-4B2D-9783-8E2B01D631E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.86:*:*:*:*:*:*:*", "matchCriteriaId": "30136876-3778-4C3A-9CE3-0440588594A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.90:*:*:*:*:*:*:*", "matchCriteriaId": "39972E3A-B377-44DC-B16B-AA6E7ECCE29D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.91:*:*:*:*:*:*:*", "matchCriteriaId": "58B3AE9A-2337-4225-8C1B-87933EE99E18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.95:*:*:*:*:*:*:*", "matchCriteriaId": "C5922BAB-7DF5-4F65-AC6E-038900B79396", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.96.0:*:*:*:*:*:*:*", "matchCriteriaId": "5816EC94-1005-4467-825A-6BB43525FE43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.03:*:linux:*:*:*:*:*", "matchCriteriaId": "DD24F0C5-CB2B-4C67-BD0E-34A1C6358618", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "7D9D6E1E-9FA4-4BA1-8648-2E1A6A8FC4CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "799249AD-3E8A-4584-A680-A3E618B5372D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "587205B1-322E-478D-9B46-8F20F371C87C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B9B6B5D4-E335-4377-8D98-87656522D056", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ED1228F-0733-42D9-853A-B1EB4EB20A91", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "136B6228-D71B-4985-B555-5ABC38EF2B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4518D58D-BD49-4E02-AB93-B1B45B774F2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "A398BC60-0F67-4A32-A6CD-F3410D81834F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55D2CFB6-F135-40B5-ACF8-D6513C0AB682", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B781BEA-E3D6-4260-913F-99D46DCC97D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4D7952D2-2FE4-44E3-B964-976964CFFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "05361082-2A61-40D9-9EEE-6ED3C032FB22", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.9:*:linux:*:*:*:*:*", "matchCriteriaId": "98A094D5-C2AD-4DFE-A088-0011268BB65C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0AF1DE9-A0A1-4193-9AD9-56BF39F3557A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7CC4E8-C039-4895-A3EF-BF1927266744", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "67E8DF83-4F1B-4E4C-A613-EF0C4502FA5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "41FAD883-919D-4719-A964-C93F40EE658D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:scanning_engine:2.30.4:*:*:*:*:*:*:*", "matchCriteriaId": "6A092119-BF22-4FDC-8922-4993AEAA1327", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:scanning_engine:2.40.2:*:*:*:*:*:*:*", "matchCriteriaId": "B4E7AE52-0978-4EBB-8177-CCF792B98DAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:small_business_suite:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "9B8657D5-7DB2-428D-9125-B3BC4D5F2263", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:small_business_suite:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "190B0808-8ABD-499C-8A84-7B630BB1E2E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an \"integer cast around\". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable." }, { "lang": "es", "value": "Sophos Anti-Virus para Windows y para Unix/Linux anterior a 2.48.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un archivo empaquetado con UPX manipulado, resultado de una \"conversi\u00f3n de vuelta de entero\" (integer cast around). NOTA: a fecha de 28/08/2007, el fabricante dice que esto es una denegaci\u00f3n de servicio y el investigador dice que permite ejecuci\u00f3n de c\u00f3digo, pero el investigador es fiable." } ], "id": "CVE-2007-4578", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-08-28T18:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26580" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3072" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018608" }, { "source": "cve@mitre.org", "url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25428" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3072" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2972" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…