Vulnerabilites related to avira - antivir_personal
Vulnerability from fkie_nvd
Published
2007-05-09 01:19
Modified
2024-11-21 00:28
Severity ?
Summary
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amavis:amavis:*:*:*:*:*:*:*:*", "matchCriteriaId": "64AF6FAE-B025-4F70-9F52-C7C12C6F705D", "versionEndIncluding": "2.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AC3BF13-2946-411E-93A5-0C3AF0508C60", "versionEndIncluding": "4.7.980", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus:4.6.394:*:*:*:*:*:*:*", "matchCriteriaId": "8683D747-C092-4841-AABF-280D7EB771F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus:4.7.652:*:*:*:*:*:*:*", "matchCriteriaId": "D393356E-0464-41B6-9D56-2DCFC6900244", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus:4.7.700:*:*:*:*:*:*:*", "matchCriteriaId": "0ED7C89E-E28B-4BE9-952D-86A8D089B41D", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1519A450-8F71-408A-81B8-AA6F337E7A25", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "48872452-2B26-44C4-A9FF-0D9D23AAC95A", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.652:*:*:*:*:*:*:*", "matchCriteriaId": "275D7948-61FB-4415-A9EB-59EEF9757149", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.655:*:*:*:*:*:*:*", "matchCriteriaId": "5CCC4081-D877-4DE3-9342-59BCE7C41CE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.665:*:*:*:*:*:*:*", "matchCriteriaId": "B189DFCB-2307-43B4-8102-BA725CEE0711", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.691:*:*:*:*:*:*:*", "matchCriteriaId": "3C733E69-33B3-465B-B146-A68C26373E00", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:*:*:*:*:*:*", "matchCriteriaId": "2EF16A3D-BC29-4426-BDF5-F1C6E85228B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:windows:*:*:*:*:*", "matchCriteriaId": "33A71A2C-36AC-4F36-9D94-AA824F4DE14C", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:*:*:*:*:*:*", "matchCriteriaId": "E02983BB-F027-4967-A230-933299D2D061", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:windows:*:*:*:*:*", "matchCriteriaId": "62618C12-3EAC-4434-B2A8-D83612F1A05C", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:*:*:*:*:*:*", "matchCriteriaId": "238FB2B1-41CF-46DB-8ED7-7F2B6609C27D", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:windows:*:*:*:*:*", "matchCriteriaId": "B949535B-9771-4AC6-BBDB-8BB3A789A1FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:*:*:*:*:*:*", "matchCriteriaId": "97FEA351-FFF6-4452-9A2B-A7AAF4D7EE20", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:windows:*:*:*:*:*", "matchCriteriaId": "DC6DA89A-BF71-4031-9B51-E5941FDE5E15", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:*:*:*:*:*:*", "matchCriteriaId": "18837F1C-8ECD-4202-9489-08D63FB28CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:windows:*:*:*:*:*", "matchCriteriaId": "DB201D49-EB74-4A5D-B641-86C4429E3EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "231DDF5E-5026-4844-8374-45F0926F8C4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "8822D55C-FEE7-41B5-A8D5-8D9F514CF815", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.603:*:*:*:*:*:*:*", "matchCriteriaId": "B89C0CA4-00DE-4CAD-B554-36C46815A919", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.652:*:*:*:*:*:*:*", "matchCriteriaId": "A618B922-80E7-4769-90BA-5FE231DA6B89", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.665:*:*:*:*:*:*:*", "matchCriteriaId": "40F19B83-BAD9-4CDC-95C5-6D352F223AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.691:*:*:*:*:*:*:*", "matchCriteriaId": "762B6C23-5ADD-4221-8146-DF9CE95637BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:*:*:*:*:*:*", "matchCriteriaId": "2F3B1651-DC3E-43B8-A5A4-8BEF7D668EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:windows:*:*:*:*:*", "matchCriteriaId": "DF2D8C10-01E4-43D7-93EE-342BA7E9C489", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:*:*:*:*:*:*", "matchCriteriaId": "3D0980CA-26A4-468E-82F3-E03953250343", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:windows:*:*:*:*:*", "matchCriteriaId": "AAB7888A-E884-4C73-AF10-698C56E080F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.869:*:*:*:*:*:*:*", "matchCriteriaId": "FF5B2325-D8EE-4D1E-8291-740726FC1EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:*:*:*:*:*:*", "matchCriteriaId": "FB0EF168-1F0D-4772-8922-0A75CAF28661", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:windows:*:*:*:*:*", "matchCriteriaId": "1F7F2957-4422-4891-B573-F68882D7C8E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1098:*:*:*:*:*:*:*", "matchCriteriaId": "5CAED694-2497-488B-A2AB-0781501678F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDD00670-7EC0-4AA4-98EF-C8AE38330284", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir:6.35.00.00:*:*:*:*:*:*:*", "matchCriteriaId": "C23C179C-B50E-4F47-BFFA-85848131C99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir:7.04.00.23:*:*:*:*:*:*:*", "matchCriteriaId": "5C813AD8-5D73-41DF-B710-3CEB20FB9EF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*", "matchCriteriaId": "B38A75AF-D8B4-4B54-87E9-6EED562CAAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:classic:*:*:*:*:*", "matchCriteriaId": "5DB520B5-36E8-4F4B-99FF-0FF3F708CC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:premium:*:*:*:*:*", "matchCriteriaId": "BECD1C6B-EC0F-4203-BA12-F8B02472FF4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD267D52-D580-4460-AFF9-E5BA478A98FA", "versionEndIncluding": "7.3.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:7:*:*:*:*:*:*:*", "matchCriteriaId": "64D94528-A54F-439B-8584-57A82CDF7318", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:7:*:classic:*:*:*:*:*", "matchCriteriaId": "DB66A5A4-6758-438D-9155-7475A5406DA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:panda:panda_antivirus:2007:*:*:*:*:*:*:*", "matchCriteriaId": "A9F9AF4F-E974-4D6F-AF51-0DA7A59E64FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:panda:panda_antivirus_and_firewall:2007:*:*:*:*:*:*:*", "matchCriteriaId": "C4DBEED1-0648-45F3-AFC2-91C872A1B098", "vulnerable": true }, { "criteria": "cpe:2.3:a:picozip:picozip:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AD36471-D8DC-4B11-B53B-264AB1560063", "vulnerable": true }, { "criteria": "cpe:2.3:a:rahul_dhesi:zoo:*:*:*:*:*:*:*:*", "matchCriteriaId": "79845C9F-7884-4F77-B492-4A944D3DCCEA", "versionEndIncluding": "2.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:unzoo:unzoo:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B93C2E82-03E5-42CE-A589-B82FBCBE7D52", "vulnerable": true }, { "criteria": "cpe:2.3:a:winace:winace:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF7B6EE8-25D5-4C89-A0B8-A069D330A9D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D03D666-D234-4626-82F9-EC5726BE1920", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_100:*:*:*:*:*:*:*", "matchCriteriaId": "D0BEEFB2-C6ED-43D5-B535-623931C38890", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_200:*:*:*:*:*:*:*", "matchCriteriaId": "C2ECF7F8-A29F-4868-9DE5-4227E5DA2285", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_300:*:*:*:*:*:*:*", "matchCriteriaId": "6A897043-9003-4F27-8C7D-AE6B2BD0389C", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_400:*:*:*:*:*:*:*", "matchCriteriaId": "1F05FEF8-6B34-4874-AD6B-A053415BD939", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_500:*:*:*:*:*:*:*", "matchCriteriaId": "D28FAD61-3723-4CCC-B890-C5869E7AC3EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_600:*:*:*:*:*:*:*", "matchCriteriaId": "7697AAC2-EC8A-496E-9336-29AAE61CD69E", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_800:*:*:*:*:*:*:*", "matchCriteriaId": "BAA47F3A-44BA-4011-8A44-1AE54D02E772", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_900:*:*:*:*:*:*:*", "matchCriteriaId": "423620AD-EA6A-4730-B97A-DF67247372BE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file." }, { "lang": "es", "value": "El archivo unzoo.c, tal como se utiliza en varios productos, incluyendo AMaViS versi\u00f3n 2.4.1 y anteriores, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito) por medio de un archivo ZOO con una estructura direntry que apunta hacia un archivo anterior." } ], "evaluatorSolution": "http://xforce.iss.net/xforce/xfdb/34080\r\n\r\n\r\nFor Barracuda Spam Firewall:\r\nUpgrade to the latest virus definition version of Barracuda Spam Firewall (virusdef 2.0.6399 for 3.4 and after or virusdef 2.0.6399o for prior to 3.4), available from the automatic update.\r\n\r\nFor Panda Software Antivirus:\r\nUpgrade to the latest version of Panda Software Antivirus (4/2/2007 or later), available from the automatic update feature.\r\n\r\nFor avast! antivirus:\r\nUpgrade to the latest version of Panda Software Antivirus (4.7.981 or later), available from the avast! antivirus Web site. See references.\r\n\r\nFor Avira AntiVir:\r\nUpgrade to the latest version of Avira AntiVir (avpack32.dll version 7.3.0.6 or later), available from the automatic update feature.\r\n\r\nFor AMaViS:\r\nRefer to ASA-2007-2 for patch, upgrade, or suggested workaround information. See References.", "id": "CVE-2007-1673", "lastModified": "2024-11-21T00:28:54.050", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-09T01:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/36208" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25315" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2680" }, { "source": "cve@mitre.org", "url": "http://www.amavis.org/security/asa-2007-2.txt" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/23823" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.amavis.org/security/asa-2007-2.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/23823" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-13 16:30
Modified
2024-11-21 00:57
Severity ?
Summary
Avira AntiVir Premium, Premium Security Suite, AntiVir Professional, and AntiVir Personal - FREE allows local users to execute arbitrary code via a crafted IOCTL request that overwrites a kernel pointer.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
avira | antivir | - | |
avira | antivir | 6.35.00.00 | |
avira | antivir_personal | * | |
avira | antivir_personal | * | |
avira | antivir_professional | * | |
avira | antivir_security_suite | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avira:antivir:-:-:premium:*:*:*:*:*", "matchCriteriaId": "60FC2C76-3B5F-418E-A2DD-9F5D2FBE4EF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir:6.35.00.00:*:*:*:*:*:*:*", "matchCriteriaId": "C23C179C-B50E-4F47-BFFA-85848131C99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*", "matchCriteriaId": "B38A75AF-D8B4-4B54-87E9-6EED562CAAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:premium:*:*:*:*:*", "matchCriteriaId": "BECD1C6B-EC0F-4203-BA12-F8B02472FF4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_professional:*:*:*:*:*:*:*:*", "matchCriteriaId": "E36F359D-D095-45BB-9154-707F3889B44F", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_security_suite:-:-:premium:*:*:*:*:*", "matchCriteriaId": "F805305F-CFA4-4BC9-8C89-885D85B4B8E5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Avira AntiVir Premium, Premium Security Suite, AntiVir Professional, and AntiVir Personal - FREE allows local users to execute arbitrary code via a crafted IOCTL request that overwrites a kernel pointer." }, { "lang": "es", "value": "Avira AntiVir Premium, Premium Security Suite, AntiVir Professional, y AntiVir Personal - FREE permite a los usuarios locales ejecutar arbitrariamente c\u00f3digo a trav\u00e9s de peticiones IOCTL manipuladas que sobreescriben un puntero al n\u00facleo." } ], "id": "CVE-2008-6962", "lastModified": "2024-11-21T00:57:55.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-13T16:30:00.953", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/32269" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/VUPEN-Security-Advisory-20081112.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/3130" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46567" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/32269" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/VUPEN-Security-Advisory-20081112.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/3130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46567" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-10-14 10:02
Modified
2024-11-21 00:01
Severity ?
Summary
Multiple interpretation error in unspecified versions of Avira Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
avira | antivir_personal | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*", "matchCriteriaId": "B38A75AF-D8B4-4B54-87E9-6EED562CAAC1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple interpretation error in unspecified versions of Avira Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper." } ], "id": "CVE-2005-3219", "lastModified": "2024-11-21T00:01:23.043", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2005-10-14T10:02:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=112879611919750\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://shadock.net/secubox/AVCraftedArchive.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=112879611919750\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://shadock.net/secubox/AVCraftedArchive.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-10-14 10:02
Modified
2024-11-21 00:01
Severity ?
Summary
Multiple interpretation error in unspecified versions of AntiVir Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
avira | antivir_personal | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*", "matchCriteriaId": "B38A75AF-D8B4-4B54-87E9-6EED562CAAC1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple interpretation error in unspecified versions of AntiVir Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper." } ], "id": "CVE-2005-3224", "lastModified": "2024-11-21T00:01:23.683", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2005-10-14T10:02:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=112879611919750\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://shadock.net/secubox/AVCraftedArchive.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=112879611919750\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://shadock.net/secubox/AVCraftedArchive.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-12 22:15
Modified
2024-11-21 01:55
Severity ?
Summary
A Denial of Service (infinite loop) vulnerability exists in Avira AntiVir Engine before 8.2.12.58 via an unspecified function in the PDF Scanner Engine.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
avira | antivir_mailgate | * | |
avira | antivir_mailgate_suite | * | |
avira | antivir_personal | * | |
avira | antivir_sharepoint | * | |
avira | antivir_webgate | * | |
avira | antivir_webgate_suite | * | |
avira | antivirus_server | * | |
avira | exchange_security | * | |
avira | professional_security | * | |
avira | savapi | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avira:antivir_mailgate:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B1B2ACA-E86D-486B-90CC-AFAEA1984953", "versionEndExcluding": "8.2.12.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_mailgate_suite:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F1B54AF-0981-49FE-9DE4-BB9D37B16900", "versionEndExcluding": "8.2.12.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BDC1E0B-5D6F-407F-88CA-2E1521A7B3F2", "versionEndExcluding": "8.2.12.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_sharepoint:*:*:*:*:*:*:*:*", "matchCriteriaId": "0344C9ED-261F-4E19-8645-28422B4DC9F7", "versionEndExcluding": "8.2.12.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_webgate:*:*:*:*:*:*:*:*", "matchCriteriaId": "5715AE53-CD49-40AD-A765-889C9768CD83", "versionEndExcluding": "8.2.12.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_webgate_suite:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB6F056D-B117-465E-9C77-2655F83DC32E", "versionEndExcluding": "8.2.12.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivirus_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "2495B204-480F-4C0D-8A43-955D17A94590", "versionEndExcluding": "8.2.12.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:exchange_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B60B790-6B4B-431E-BD1A-1CAE80DCDF5C", "versionEndExcluding": "8.2.12.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:professional_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D2869FB-4930-4B47-8169-A7DD9A7FC488", "versionEndExcluding": "8.2.12.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:savapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1E6C9D3-2F10-4142-B736-B4F47FAD9FE2", "versionEndExcluding": "8.2.12.58", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Denial of Service (infinite loop) vulnerability exists in Avira AntiVir Engine before 8.2.12.58 via an unspecified function in the PDF Scanner Engine." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de denegaci\u00f3n de servicio (bucle infinito) en Avira AntiVir Engine versiones anteriores a 8.2.12.58, por medio de una funci\u00f3n no especificada en el PDF Scanner Engine." } ], "id": "CVE-2013-4602", "lastModified": "2024-11-21T01:55:54.840", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-12T22:15:12.550", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/60552" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1028666" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85099" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/122024/Avira-AntiVir-Engine-Denial-Of-Service-Filter-Evasion.html" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.9151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/60552" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1028666" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/122024/Avira-AntiVir-Engine-Denial-Of-Service-Filter-Evasion.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.9151" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-09-07 00:04
Modified
2024-11-21 00:16
Severity ?
Summary
The start update window in update.exe in Avira AntiVir PersonalEdition Classic 7.0 build 151 allows local users to gain system privileges via a "Shatter" style attack on the (1) IParam parameter, and the (2) PBM_GETRANGE and (3) PBM_SETRANGE messages in an unspecified progress bar. NOTE: some details are obtained from third party information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
avira | antivir_personal | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:classic:*:*:*:*:*", "matchCriteriaId": "5DB520B5-36E8-4F4B-99FF-0FF3F708CC8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The start update window in update.exe in Avira AntiVir PersonalEdition Classic 7.0 build 151 allows local users to gain system privileges via a \"Shatter\" style attack on the (1) IParam parameter, and the (2) PBM_GETRANGE and (3) PBM_SETRANGE messages in an unspecified progress bar. NOTE: some details are obtained from third party information." }, { "lang": "es", "value": "La ventana de inicio de actualizaci\u00f3n en update.exe en Avira AntiVir PersonalEdition Classic 7.0 construcci\u00f3n 151 permite a un usuario local conseguir privilegios de sistema a trav\u00e9s del tipo de ataque \"Shatter\" sobre el par\u00e1metro (1)IParam, y los mensajes (2) PBM_GETRANGE y (3) PBM_SETRANGE en una barra de progreso no especifica. NOTA: algunos detalles se obtuvieron a partir de una informaci\u00f3n de terceros." } ], "id": "CVE-2006-4619", "lastModified": "2024-11-21T00:16:23.423", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-09-07T00:04:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/21764" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/445205/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/445263/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19843" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21764" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/445205/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/445263/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19889" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-03-19 11:06
Modified
2024-11-21 00:08
Severity ?
Summary
Classic Planer in AntiVir PersonalEdition Classic 7 does not drop privileges before executing external programs, which allows local users to gain privileges via notepad.exe, which is used to display scan reports.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
avira | antivir_personal | * | |
avira | antivir_personal | 7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:premium:*:*:*:*:*", "matchCriteriaId": "BECD1C6B-EC0F-4203-BA12-F8B02472FF4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:7:*:classic:*:*:*:*:*", "matchCriteriaId": "DB66A5A4-6758-438D-9155-7475A5406DA5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Classic Planer in AntiVir PersonalEdition Classic 7 does not drop privileges before executing external programs, which allows local users to gain privileges via notepad.exe, which is used to display scan reports." } ], "id": "CVE-2006-1274", "lastModified": "2024-11-21T00:08:28.797", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-03-19T11:06:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042868.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19217" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/573" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/23843" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/427412/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/17071" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0948" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25244" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042868.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/573" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/23843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/427412/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/17071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25244" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-05-09 00:19
Modified
2024-11-21 00:28
Severity ?
Summary
avpack32.dll before 7.3.0.6 in Avira AntiVir allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
avira | antivir_personal | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD267D52-D580-4460-AFF9-E5BA478A98FA", "versionEndIncluding": "7.3.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "avpack32.dll before 7.3.0.6 in Avira AntiVir allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file." }, { "lang": "es", "value": "avpack32.dll anterior a 7.3.0.6 en Avira AntiVir permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bucle infinito) mediante un archivo ZOO con una estructura de entrada a directorio que apunta a un fichero anterior." } ], "id": "CVE-2007-1671", "lastModified": "2024-11-21T00:28:53.760", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-09T00:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/35911" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25140" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2680" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/23823" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1702" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/35911" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/23823" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1702" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2005-3219
Vulnerability from cvelistv5
Published
2005-10-14 04:00
Modified
2024-08-07 23:01
Severity ?
EPSS score ?
Summary
Multiple interpretation error in unspecified versions of Avira Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
References
▼ | URL | Tags |
---|---|---|
http://shadock.net/secubox/AVCraftedArchive.html | x_refsource_MISC | |
http://marc.info/?l=bugtraq&m=112879611919750&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:01:59.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://shadock.net/secubox/AVCraftedArchive.html" }, { "name": "20051007 Antivirus detection bypass by special crafted archive.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112879611919750\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-10-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple interpretation error in unspecified versions of Avira Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://shadock.net/secubox/AVCraftedArchive.html" }, { "name": "20051007 Antivirus detection bypass by special crafted archive.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=112879611919750\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3219", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple interpretation error in unspecified versions of Avira Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://shadock.net/secubox/AVCraftedArchive.html", "refsource": "MISC", "url": "http://shadock.net/secubox/AVCraftedArchive.html" }, { "name": "20051007 Antivirus detection bypass by special crafted archive.", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=112879611919750\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3219", "datePublished": "2005-10-14T04:00:00", "dateReserved": "2005-10-14T00:00:00", "dateUpdated": "2024-08-07T23:01:59.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4602
Vulnerability from cvelistv5
Published
2020-02-12 21:17
Modified
2024-08-06 16:52
Severity ?
EPSS score ?
Summary
A Denial of Service (infinite loop) vulnerability exists in Avira AntiVir Engine before 8.2.12.58 via an unspecified function in the PDF Scanner Engine.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/60552 | x_refsource_MISC | |
http://www.securitytracker.com/id/1028666 | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/85099 | x_refsource_MISC | |
https://vuldb.com/?id.9151 | x_refsource_MISC | |
https://packetstormsecurity.com/files/122024/Avira-AntiVir-Engine-Denial-Of-Service-Filter-Evasion.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:52:26.349Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/bid/60552" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securitytracker.com/id/1028666" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85099" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vuldb.com/?id.9151" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://packetstormsecurity.com/files/122024/Avira-AntiVir-Engine-Denial-Of-Service-Filter-Evasion.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-05T00:00:00", "descriptions": [ { "lang": "en", "value": "A Denial of Service (infinite loop) vulnerability exists in Avira AntiVir Engine before 8.2.12.58 via an unspecified function in the PDF Scanner Engine." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-12T21:17:19", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/bid/60552" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securitytracker.com/id/1028666" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85099" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vuldb.com/?id.9151" }, { "tags": [ "x_refsource_MISC" ], "url": "https://packetstormsecurity.com/files/122024/Avira-AntiVir-Engine-Denial-Of-Service-Filter-Evasion.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4602", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Denial of Service (infinite loop) vulnerability exists in Avira AntiVir Engine before 8.2.12.58 via an unspecified function in the PDF Scanner Engine." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.securityfocus.com/bid/60552", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/60552" }, { "name": "http://www.securitytracker.com/id/1028666", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1028666" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85099", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85099" }, { "name": "https://vuldb.com/?id.9151", "refsource": "MISC", "url": "https://vuldb.com/?id.9151" }, { "name": "https://packetstormsecurity.com/files/122024/Avira-AntiVir-Engine-Denial-Of-Service-Filter-Evasion.html", "refsource": "MISC", "url": "https://packetstormsecurity.com/files/122024/Avira-AntiVir-Engine-Denial-Of-Service-Filter-Evasion.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4602", "datePublished": "2020-02-12T21:17:19", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:52:26.349Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-4619
Vulnerability from cvelistv5
Published
2006-09-07 00:00
Modified
2024-08-07 19:14
Severity ?
EPSS score ?
Summary
The start update window in update.exe in Avira AntiVir PersonalEdition Classic 7.0 build 151 allows local users to gain system privileges via a "Shatter" style attack on the (1) IParam parameter, and the (2) PBM_GETRANGE and (3) PBM_SETRANGE messages in an unspecified progress bar. NOTE: some details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/445205/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/19889 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/21764 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/19843 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/445263/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:14:47.782Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20060904 Anti-vir vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/445205/100/0/threaded" }, { "name": "19889", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19889" }, { "name": "21764", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21764" }, { "name": "19843", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19843" }, { "name": "20060904 Anti-vir2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/445263/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The start update window in update.exe in Avira AntiVir PersonalEdition Classic 7.0 build 151 allows local users to gain system privileges via a \"Shatter\" style attack on the (1) IParam parameter, and the (2) PBM_GETRANGE and (3) PBM_SETRANGE messages in an unspecified progress bar. NOTE: some details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20060904 Anti-vir vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/445205/100/0/threaded" }, { "name": "19889", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19889" }, { "name": "21764", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21764" }, { "name": "19843", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19843" }, { "name": "20060904 Anti-vir2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/445263/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4619", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The start update window in update.exe in Avira AntiVir PersonalEdition Classic 7.0 build 151 allows local users to gain system privileges via a \"Shatter\" style attack on the (1) IParam parameter, and the (2) PBM_GETRANGE and (3) PBM_SETRANGE messages in an unspecified progress bar. NOTE: some details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20060904 Anti-vir vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/445205/100/0/threaded" }, { "name": "19889", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19889" }, { "name": "21764", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21764" }, { "name": "19843", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19843" }, { "name": "20060904 Anti-vir2", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/445263/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4619", "datePublished": "2006-09-07T00:00:00", "dateReserved": "2006-09-06T00:00:00", "dateUpdated": "2024-08-07T19:14:47.782Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-1274
Vulnerability from cvelistv5
Published
2006-03-19 11:00
Modified
2024-08-07 17:03
Severity ?
EPSS score ?
Summary
Classic Planer in AntiVir PersonalEdition Classic 7 does not drop privileges before executing external programs, which allows local users to gain privileges via notepad.exe, which is used to display scan reports.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/427412/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2006/0948 | vdb-entry, x_refsource_VUPEN | |
http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042868.html | mailing-list, x_refsource_FULLDISC | |
http://www.osvdb.org/23843 | vdb-entry, x_refsource_OSVDB | |
http://securityreason.com/securityalert/573 | third-party-advisory, x_refsource_SREASON | |
http://secunia.com/advisories/19217 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/17071 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25244 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:03:28.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20060311 AntiVir PersonalEdition Classic: Local Privilige Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/427412/100/0/threaded" }, { "name": "ADV-2006-0948", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0948" }, { "name": "20060311 AntiVir PersonalEdition Classic: Local Privilige Escalation", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042868.html" }, { "name": "23843", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/23843" }, { "name": "573", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/573" }, { "name": "19217", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19217" }, { "name": "17071", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17071" }, { "name": "antivir-notepad-gain-privilege(25244)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25244" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-03-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Classic Planer in AntiVir PersonalEdition Classic 7 does not drop privileges before executing external programs, which allows local users to gain privileges via notepad.exe, which is used to display scan reports." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20060311 AntiVir PersonalEdition Classic: Local Privilige Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/427412/100/0/threaded" }, { "name": "ADV-2006-0948", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0948" }, { "name": "20060311 AntiVir PersonalEdition Classic: Local Privilige Escalation", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042868.html" }, { "name": "23843", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/23843" }, { "name": "573", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/573" }, { "name": "19217", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19217" }, { "name": "17071", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17071" }, { "name": "antivir-notepad-gain-privilege(25244)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25244" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-1274", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Classic Planer in AntiVir PersonalEdition Classic 7 does not drop privileges before executing external programs, which allows local users to gain privileges via notepad.exe, which is used to display scan reports." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20060311 AntiVir PersonalEdition Classic: Local Privilige Escalation", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/427412/100/0/threaded" }, { "name": "ADV-2006-0948", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0948" }, { "name": "20060311 AntiVir PersonalEdition Classic: Local Privilige Escalation", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042868.html" }, { "name": "23843", "refsource": "OSVDB", "url": "http://www.osvdb.org/23843" }, { "name": "573", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/573" }, { "name": "19217", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19217" }, { "name": "17071", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17071" }, { "name": "antivir-notepad-gain-privilege(25244)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25244" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-1274", "datePublished": "2006-03-19T11:00:00", "dateReserved": "2006-03-18T00:00:00", "dateUpdated": "2024-08-07T17:03:28.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1673
Vulnerability from cvelistv5
Published
2007-05-09 01:00
Modified
2024-08-07 13:06
Severity ?
EPSS score ?
Summary
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
References
▼ | URL | Tags |
---|---|---|
http://www.amavis.org/security/asa-2007-2.txt | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34080 | vdb-entry, x_refsource_XF | |
http://osvdb.org/36208 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/23823 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/25315 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/467646/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securityreason.com/securityalert/2680 | third-party-advisory, x_refsource_SREASON |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:06:25.976Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.amavis.org/security/asa-2007-2.txt" }, { "name": "multiple-vendor-zoo-dos(34080)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "name": "36208", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36208" }, { "name": "23823", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23823" }, { "name": "25315", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25315" }, { "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "name": "2680", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2680" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-07T00:00:00", "descriptions": [ { "lang": "en", "value": "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.amavis.org/security/asa-2007-2.txt" }, { "name": "multiple-vendor-zoo-dos(34080)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "name": "36208", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36208" }, { "name": "23823", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23823" }, { "name": "25315", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25315" }, { "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "name": "2680", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2680" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1673", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.amavis.org/security/asa-2007-2.txt", "refsource": "CONFIRM", "url": "http://www.amavis.org/security/asa-2007-2.txt" }, { "name": "multiple-vendor-zoo-dos(34080)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "name": "36208", "refsource": "OSVDB", "url": "http://osvdb.org/36208" }, { "name": "23823", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23823" }, { "name": "25315", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25315" }, { "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "name": "2680", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2680" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1673", "datePublished": "2007-05-09T01:00:00", "dateReserved": "2007-03-24T00:00:00", "dateUpdated": "2024-08-07T13:06:25.976Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-6962
Vulnerability from cvelistv5
Published
2009-08-13 16:00
Modified
2024-08-07 11:49
Severity ?
EPSS score ?
Summary
Avira AntiVir Premium, Premium Security Suite, AntiVir Professional, and AntiVir Personal - FREE allows local users to execute arbitrary code via a crafted IOCTL request that overwrites a kernel pointer.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/46567 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/VUPEN-Security-Advisory-20081112.txt | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2008/3130 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/32269 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:49:02.509Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "avira-ioctl-privilege-escalation(46567)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46567" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.vupen.com/english/VUPEN-Security-Advisory-20081112.txt" }, { "name": "ADV-2008-3130", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3130" }, { "name": "32269", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32269" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Avira AntiVir Premium, Premium Security Suite, AntiVir Professional, and AntiVir Personal - FREE allows local users to execute arbitrary code via a crafted IOCTL request that overwrites a kernel pointer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "avira-ioctl-privilege-escalation(46567)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46567" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.vupen.com/english/VUPEN-Security-Advisory-20081112.txt" }, { "name": "ADV-2008-3130", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3130" }, { "name": "32269", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32269" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6962", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Avira AntiVir Premium, Premium Security Suite, AntiVir Professional, and AntiVir Personal - FREE allows local users to execute arbitrary code via a crafted IOCTL request that overwrites a kernel pointer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "avira-ioctl-privilege-escalation(46567)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46567" }, { "name": "http://www.vupen.com/english/VUPEN-Security-Advisory-20081112.txt", "refsource": "MISC", "url": "http://www.vupen.com/english/VUPEN-Security-Advisory-20081112.txt" }, { "name": "ADV-2008-3130", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3130" }, { "name": "32269", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32269" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6962", "datePublished": "2009-08-13T16:00:00", "dateReserved": "2009-08-13T00:00:00", "dateUpdated": "2024-08-07T11:49:02.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1671
Vulnerability from cvelistv5
Published
2007-05-09 00:00
Modified
2024-08-07 13:06
Severity ?
EPSS score ?
Summary
avpack32.dll before 7.3.0.6 in Avira AntiVir allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/34080 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/25140 | third-party-advisory, x_refsource_SECUNIA | |
http://osvdb.org/35911 | vdb-entry, x_refsource_OSVDB | |
http://www.vupen.com/english/advisories/2007/1702 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/23823 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/467646/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securityreason.com/securityalert/2680 | third-party-advisory, x_refsource_SREASON |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:06:26.046Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "multiple-vendor-zoo-dos(34080)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "name": "25140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25140" }, { "name": "35911", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/35911" }, { "name": "ADV-2007-1702", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1702" }, { "name": "23823", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23823" }, { "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "name": "2680", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2680" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-07T00:00:00", "descriptions": [ { "lang": "en", "value": "avpack32.dll before 7.3.0.6 in Avira AntiVir allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "multiple-vendor-zoo-dos(34080)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "name": "25140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25140" }, { "name": "35911", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/35911" }, { "name": "ADV-2007-1702", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1702" }, { "name": "23823", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23823" }, { "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "name": "2680", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2680" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1671", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "avpack32.dll before 7.3.0.6 in Avira AntiVir allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "multiple-vendor-zoo-dos(34080)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "name": "25140", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25140" }, { "name": "35911", "refsource": "OSVDB", "url": "http://osvdb.org/35911" }, { "name": "ADV-2007-1702", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1702" }, { "name": "23823", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23823" }, { "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "name": "2680", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2680" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1671", "datePublished": "2007-05-09T00:00:00", "dateReserved": "2007-03-24T00:00:00", "dateUpdated": "2024-08-07T13:06:26.046Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-3224
Vulnerability from cvelistv5
Published
2005-10-14 04:00
Modified
2024-08-07 23:01
Severity ?
EPSS score ?
Summary
Multiple interpretation error in unspecified versions of AntiVir Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
References
▼ | URL | Tags |
---|---|---|
http://shadock.net/secubox/AVCraftedArchive.html | x_refsource_MISC | |
http://marc.info/?l=bugtraq&m=112879611919750&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:01:59.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://shadock.net/secubox/AVCraftedArchive.html" }, { "name": "20051007 Antivirus detection bypass by special crafted archive.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112879611919750\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-10-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple interpretation error in unspecified versions of AntiVir Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://shadock.net/secubox/AVCraftedArchive.html" }, { "name": "20051007 Antivirus detection bypass by special crafted archive.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=112879611919750\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3224", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple interpretation error in unspecified versions of AntiVir Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://shadock.net/secubox/AVCraftedArchive.html", "refsource": "MISC", "url": "http://shadock.net/secubox/AVCraftedArchive.html" }, { "name": "20051007 Antivirus detection bypass by special crafted archive.", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=112879611919750\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3224", "datePublished": "2005-10-14T04:00:00", "dateReserved": "2005-10-14T00:00:00", "dateUpdated": "2024-08-07T23:01:59.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }