Search criteria

9 vulnerabilities found for endpoint_security by sophos

FKIE_CVE-2006-5646

Vulnerability from fkie_nvd - Published: 2006-11-01 15:07 - Updated: 2025-04-09 00:30
Severity ?
Summary
Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D9D6E1E-9FA4-4BA1-8648-2E1A6A8FC4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "799249AD-3E8A-4584-A680-A3E618B5372D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "587205B1-322E-478D-9B46-8F20F371C87C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9B6B5D4-E335-4377-8D98-87656522D056",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED1228F-0733-42D9-853A-B1EB4EB20A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "136B6228-D71B-4985-B555-5ABC38EF2B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4518D58D-BD49-4E02-AB93-B1B45B774F2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A398BC60-0F67-4A32-A6CD-F3410D81834F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "55D2CFB6-F135-40B5-ACF8-D6513C0AB682",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B781BEA-E3D6-4260-913F-99D46DCC97D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D7952D2-2FE4-44E3-B964-976964CFFB3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0AF1DE9-A0A1-4193-9AD9-56BF39F3557A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7CC4E8-C039-4895-A3EF-BF1927266744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "67E8DF83-4F1B-4E4C-A613-EF0C4502FA5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "08FACDD3-92A8-4325-AD0D-81100BA81F7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:endpoint_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39B0A565-0E33-419F-B209-7F87CB7AC702",
              "versionEndIncluding": "6.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en mont\u00f3n en Sophos Anti-Virus y Endpoint Security versiones anteriores a 6.0.5, Anti-Virus para Linux anteriores a 5.0.10, y otras plataformas anteriores a 4.11, cuando el escaneo de archivos est\u00e1 habilitado, permite a atacantes remotos disparar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un archivo CHM con una cabecera de descompresi\u00f3n LZX que especifica un tama\u00f1o de ventana 0."
    }
  ],
  "id": "CVE-2006-5646",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-11-01T15:07:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22591"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1017132"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/20816"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/4239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22591"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017132"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/20816"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/4239"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-5645

Vulnerability from fkie_nvd - Published: 2006-11-01 15:07 - Updated: 2025-04-09 00:30
Severity ?
Summary
Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when "Enabled scanning of archives" is set, allows remote attackers to cause a denial of service (infinite loop) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D9D6E1E-9FA4-4BA1-8648-2E1A6A8FC4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "799249AD-3E8A-4584-A680-A3E618B5372D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "587205B1-322E-478D-9B46-8F20F371C87C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9B6B5D4-E335-4377-8D98-87656522D056",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED1228F-0733-42D9-853A-B1EB4EB20A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "136B6228-D71B-4985-B555-5ABC38EF2B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4518D58D-BD49-4E02-AB93-B1B45B774F2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A398BC60-0F67-4A32-A6CD-F3410D81834F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "55D2CFB6-F135-40B5-ACF8-D6513C0AB682",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B781BEA-E3D6-4260-913F-99D46DCC97D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D7952D2-2FE4-44E3-B964-976964CFFB3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0AF1DE9-A0A1-4193-9AD9-56BF39F3557A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7CC4E8-C039-4895-A3EF-BF1927266744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "67E8DF83-4F1B-4E4C-A613-EF0C4502FA5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "08FACDD3-92A8-4325-AD0D-81100BA81F7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:endpoint_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39B0A565-0E33-419F-B209-7F87CB7AC702",
              "versionEndIncluding": "6.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when \"Enabled scanning of archives\" is set, allows remote attackers to cause a denial of service (infinite loop) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero."
    },
    {
      "lang": "es",
      "value": "Sophos Anti-Virus y Endpoint Security anteriores a 6.0.5, Anti-virus para Linux 5.0.10, y otras plataformas en versiones anteriores a la 4.11, permite a atacantes remotos causar denegaci\u00f3n de servicio (bucle infinito) mediante un fichero RAR mal formado con una secci\u00f3n de Cabecera de Archivo con los campos head_size y pack_size puestos a cero."
    }
  ],
  "id": "CVE-2006-5645",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-11-01T15:07:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22591"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1017132"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/20816"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018450"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/4239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22591"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017132"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/20816"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018450"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/4239"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-5647

Vulnerability from fkie_nvd - Published: 2006-11-01 15:07 - Updated: 2025-04-09 00:30
Severity ?
Summary
Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka "CHM name length memory consumption vulnerability."

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D9D6E1E-9FA4-4BA1-8648-2E1A6A8FC4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "799249AD-3E8A-4584-A680-A3E618B5372D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "587205B1-322E-478D-9B46-8F20F371C87C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9B6B5D4-E335-4377-8D98-87656522D056",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED1228F-0733-42D9-853A-B1EB4EB20A91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "136B6228-D71B-4985-B555-5ABC38EF2B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4518D58D-BD49-4E02-AB93-B1B45B774F2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A398BC60-0F67-4A32-A6CD-F3410D81834F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "55D2CFB6-F135-40B5-ACF8-D6513C0AB682",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B781BEA-E3D6-4260-913F-99D46DCC97D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D7952D2-2FE4-44E3-B964-976964CFFB3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0AF1DE9-A0A1-4193-9AD9-56BF39F3557A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7CC4E8-C039-4895-A3EF-BF1927266744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "67E8DF83-4F1B-4E4C-A613-EF0C4502FA5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:anti-virus:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "08FACDD3-92A8-4325-AD0D-81100BA81F7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:endpoint_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39B0A565-0E33-419F-B209-7F87CB7AC702",
              "versionEndIncluding": "6.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka \"CHM name length memory consumption vulnerability.\""
    },
    {
      "lang": "es",
      "value": "Sophos Anti-Virus y Endpoint Security versiones anteriores a 6.0.5, Anti-Virus para Linux anteriores a 5.0.10, y otras plataformas anteriores a 4.11 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n o agotamiento de memoria) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un fichero CHM mal formado con manipulaciones concretas del segmento de cabecera CHM, tambi\u00e9n conocido como \"vulnerabilidad de agotamiento de memoria en longitud de nombre CHM\".\r\n"
    }
  ],
  "id": "CVE-2006-5647",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-11-01T15:07:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22591"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1017132"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/20816"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/4239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22591"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017132"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/20816"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/4239"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2006-5645 (GCVE-0-2006-5645)

Vulnerability from cvelistv5 – Published: 2006-11-01 15:00 – Updated: 2024-08-07 19:55
VLAI?
Summary
Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when "Enabled scanning of archives" is set, allows remote attackers to cause a denial of service (infinite loop) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id?1018450 vdb-entryx_refsource_SECTRACK
http://www.sophos.com/support/knowledgebase/artic… x_refsource_CONFIRM
http://securitytracker.com/id?1017132 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/4239 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/20816 vdb-entryx_refsource_BID
http://labs.idefense.com/intelligence/vulnerabili… third-party-advisoryx_refsource_IDEFENSE
http://www.securityfocus.com/archive/1/474683/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/22591 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:55:54.155Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1018450",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018450"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
          },
          {
            "name": "1017132",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017132"
          },
          {
            "name": "ADV-2006-4239",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4239"
          },
          {
            "name": "20816",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20816"
          },
          {
            "name": "20061208 Multiple Vendor Antivirus RAR File Denial of Service Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439"
          },
          {
            "name": "20070726 RE: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded"
          },
          {
            "name": "22591",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22591"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when \"Enabled scanning of archives\" is set, allows remote attackers to cause a denial of service (infinite loop) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1018450",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018450"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
        },
        {
          "name": "1017132",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017132"
        },
        {
          "name": "ADV-2006-4239",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4239"
        },
        {
          "name": "20816",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20816"
        },
        {
          "name": "20061208 Multiple Vendor Antivirus RAR File Denial of Service Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439"
        },
        {
          "name": "20070726 RE: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded"
        },
        {
          "name": "22591",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22591"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5645",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when \"Enabled scanning of archives\" is set, allows remote attackers to cause a denial of service (infinite loop) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1018450",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018450"
            },
            {
              "name": "http://www.sophos.com/support/knowledgebase/article/7609.html",
              "refsource": "CONFIRM",
              "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
            },
            {
              "name": "1017132",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017132"
            },
            {
              "name": "ADV-2006-4239",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4239"
            },
            {
              "name": "20816",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20816"
            },
            {
              "name": "20061208 Multiple Vendor Antivirus RAR File Denial of Service Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439"
            },
            {
              "name": "20070726 RE: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded"
            },
            {
              "name": "22591",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22591"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5645",
    "datePublished": "2006-11-01T15:00:00",
    "dateReserved": "2006-11-01T00:00:00",
    "dateUpdated": "2024-08-07T19:55:54.155Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5647 (GCVE-0-2006-5647)

Vulnerability from cvelistv5 – Published: 2006-11-01 15:00 – Updated: 2024-08-07 19:55
VLAI?
Summary
Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka "CHM name length memory consumption vulnerability."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.sophos.com/support/knowledgebase/artic… x_refsource_CONFIRM
http://securitytracker.com/id?1017132 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/4239 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/20816 vdb-entryx_refsource_BID
http://labs.idefense.com/intelligence/vulnerabili… third-party-advisoryx_refsource_IDEFENSE
http://secunia.com/advisories/22591 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:55:53.925Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
          },
          {
            "name": "1017132",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017132"
          },
          {
            "name": "ADV-2006-4239",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4239"
          },
          {
            "name": "20816",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20816"
          },
          {
            "name": "20061208 Sophos Antivirus CHM Chunk Name Length Memory Corruption Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451"
          },
          {
            "name": "22591",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22591"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka \"CHM name length memory consumption vulnerability.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-12-11T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
        },
        {
          "name": "1017132",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017132"
        },
        {
          "name": "ADV-2006-4239",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4239"
        },
        {
          "name": "20816",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20816"
        },
        {
          "name": "20061208 Sophos Antivirus CHM Chunk Name Length Memory Corruption Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451"
        },
        {
          "name": "22591",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22591"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5647",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka \"CHM name length memory consumption vulnerability.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.sophos.com/support/knowledgebase/article/7609.html",
              "refsource": "CONFIRM",
              "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
            },
            {
              "name": "1017132",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017132"
            },
            {
              "name": "ADV-2006-4239",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4239"
            },
            {
              "name": "20816",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20816"
            },
            {
              "name": "20061208 Sophos Antivirus CHM Chunk Name Length Memory Corruption Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451"
            },
            {
              "name": "22591",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22591"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5647",
    "datePublished": "2006-11-01T15:00:00",
    "dateReserved": "2006-11-01T00:00:00",
    "dateUpdated": "2024-08-07T19:55:53.925Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5646 (GCVE-0-2006-5646)

Vulnerability from cvelistv5 – Published: 2006-11-01 15:00 – Updated: 2024-08-07 19:55
VLAI?
Summary
Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.sophos.com/support/knowledgebase/artic… x_refsource_CONFIRM
http://securitytracker.com/id?1017132 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/4239 vdb-entryx_refsource_VUPEN
http://labs.idefense.com/intelligence/vulnerabili… third-party-advisoryx_refsource_IDEFENSE
http://www.securityfocus.com/bid/20816 vdb-entryx_refsource_BID
http://secunia.com/advisories/22591 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:55:54.135Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
          },
          {
            "name": "1017132",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017132"
          },
          {
            "name": "ADV-2006-4239",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4239"
          },
          {
            "name": "20061208 Sophos Antivirus CHM File Heap Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452"
          },
          {
            "name": "20816",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20816"
          },
          {
            "name": "22591",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22591"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-12-11T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
        },
        {
          "name": "1017132",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017132"
        },
        {
          "name": "ADV-2006-4239",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4239"
        },
        {
          "name": "20061208 Sophos Antivirus CHM File Heap Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452"
        },
        {
          "name": "20816",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20816"
        },
        {
          "name": "22591",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22591"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5646",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.sophos.com/support/knowledgebase/article/7609.html",
              "refsource": "CONFIRM",
              "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
            },
            {
              "name": "1017132",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017132"
            },
            {
              "name": "ADV-2006-4239",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4239"
            },
            {
              "name": "20061208 Sophos Antivirus CHM File Heap Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452"
            },
            {
              "name": "20816",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20816"
            },
            {
              "name": "22591",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22591"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5646",
    "datePublished": "2006-11-01T15:00:00",
    "dateReserved": "2006-11-01T00:00:00",
    "dateUpdated": "2024-08-07T19:55:54.135Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5645 (GCVE-0-2006-5645)

Vulnerability from nvd – Published: 2006-11-01 15:00 – Updated: 2024-08-07 19:55
VLAI?
Summary
Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when "Enabled scanning of archives" is set, allows remote attackers to cause a denial of service (infinite loop) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id?1018450 vdb-entryx_refsource_SECTRACK
http://www.sophos.com/support/knowledgebase/artic… x_refsource_CONFIRM
http://securitytracker.com/id?1017132 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/4239 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/20816 vdb-entryx_refsource_BID
http://labs.idefense.com/intelligence/vulnerabili… third-party-advisoryx_refsource_IDEFENSE
http://www.securityfocus.com/archive/1/474683/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/22591 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:55:54.155Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1018450",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018450"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
          },
          {
            "name": "1017132",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017132"
          },
          {
            "name": "ADV-2006-4239",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4239"
          },
          {
            "name": "20816",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20816"
          },
          {
            "name": "20061208 Multiple Vendor Antivirus RAR File Denial of Service Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439"
          },
          {
            "name": "20070726 RE: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded"
          },
          {
            "name": "22591",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22591"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when \"Enabled scanning of archives\" is set, allows remote attackers to cause a denial of service (infinite loop) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1018450",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018450"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
        },
        {
          "name": "1017132",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017132"
        },
        {
          "name": "ADV-2006-4239",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4239"
        },
        {
          "name": "20816",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20816"
        },
        {
          "name": "20061208 Multiple Vendor Antivirus RAR File Denial of Service Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439"
        },
        {
          "name": "20070726 RE: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded"
        },
        {
          "name": "22591",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22591"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5645",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when \"Enabled scanning of archives\" is set, allows remote attackers to cause a denial of service (infinite loop) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1018450",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018450"
            },
            {
              "name": "http://www.sophos.com/support/knowledgebase/article/7609.html",
              "refsource": "CONFIRM",
              "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
            },
            {
              "name": "1017132",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017132"
            },
            {
              "name": "ADV-2006-4239",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4239"
            },
            {
              "name": "20816",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20816"
            },
            {
              "name": "20061208 Multiple Vendor Antivirus RAR File Denial of Service Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439"
            },
            {
              "name": "20070726 RE: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded"
            },
            {
              "name": "22591",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22591"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5645",
    "datePublished": "2006-11-01T15:00:00",
    "dateReserved": "2006-11-01T00:00:00",
    "dateUpdated": "2024-08-07T19:55:54.155Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5647 (GCVE-0-2006-5647)

Vulnerability from nvd – Published: 2006-11-01 15:00 – Updated: 2024-08-07 19:55
VLAI?
Summary
Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka "CHM name length memory consumption vulnerability."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.sophos.com/support/knowledgebase/artic… x_refsource_CONFIRM
http://securitytracker.com/id?1017132 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/4239 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/20816 vdb-entryx_refsource_BID
http://labs.idefense.com/intelligence/vulnerabili… third-party-advisoryx_refsource_IDEFENSE
http://secunia.com/advisories/22591 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:55:53.925Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
          },
          {
            "name": "1017132",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017132"
          },
          {
            "name": "ADV-2006-4239",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4239"
          },
          {
            "name": "20816",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20816"
          },
          {
            "name": "20061208 Sophos Antivirus CHM Chunk Name Length Memory Corruption Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451"
          },
          {
            "name": "22591",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22591"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka \"CHM name length memory consumption vulnerability.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-12-11T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
        },
        {
          "name": "1017132",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017132"
        },
        {
          "name": "ADV-2006-4239",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4239"
        },
        {
          "name": "20816",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20816"
        },
        {
          "name": "20061208 Sophos Antivirus CHM Chunk Name Length Memory Corruption Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451"
        },
        {
          "name": "22591",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22591"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5647",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka \"CHM name length memory consumption vulnerability.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.sophos.com/support/knowledgebase/article/7609.html",
              "refsource": "CONFIRM",
              "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
            },
            {
              "name": "1017132",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017132"
            },
            {
              "name": "ADV-2006-4239",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4239"
            },
            {
              "name": "20816",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20816"
            },
            {
              "name": "20061208 Sophos Antivirus CHM Chunk Name Length Memory Corruption Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451"
            },
            {
              "name": "22591",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22591"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5647",
    "datePublished": "2006-11-01T15:00:00",
    "dateReserved": "2006-11-01T00:00:00",
    "dateUpdated": "2024-08-07T19:55:53.925Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5646 (GCVE-0-2006-5646)

Vulnerability from nvd – Published: 2006-11-01 15:00 – Updated: 2024-08-07 19:55
VLAI?
Summary
Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.sophos.com/support/knowledgebase/artic… x_refsource_CONFIRM
http://securitytracker.com/id?1017132 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/4239 vdb-entryx_refsource_VUPEN
http://labs.idefense.com/intelligence/vulnerabili… third-party-advisoryx_refsource_IDEFENSE
http://www.securityfocus.com/bid/20816 vdb-entryx_refsource_BID
http://secunia.com/advisories/22591 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:55:54.135Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
          },
          {
            "name": "1017132",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017132"
          },
          {
            "name": "ADV-2006-4239",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4239"
          },
          {
            "name": "20061208 Sophos Antivirus CHM File Heap Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452"
          },
          {
            "name": "20816",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20816"
          },
          {
            "name": "22591",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22591"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-12-11T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
        },
        {
          "name": "1017132",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017132"
        },
        {
          "name": "ADV-2006-4239",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4239"
        },
        {
          "name": "20061208 Sophos Antivirus CHM File Heap Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452"
        },
        {
          "name": "20816",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20816"
        },
        {
          "name": "22591",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22591"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5646",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.sophos.com/support/knowledgebase/article/7609.html",
              "refsource": "CONFIRM",
              "url": "http://www.sophos.com/support/knowledgebase/article/7609.html"
            },
            {
              "name": "1017132",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017132"
            },
            {
              "name": "ADV-2006-4239",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4239"
            },
            {
              "name": "20061208 Sophos Antivirus CHM File Heap Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452"
            },
            {
              "name": "20816",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20816"
            },
            {
              "name": "22591",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22591"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5646",
    "datePublished": "2006-11-01T15:00:00",
    "dateReserved": "2006-11-01T00:00:00",
    "dateUpdated": "2024-08-07T19:55:54.135Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}