Search criteria
12 vulnerabilities found for scanning_engine by sophos
FKIE_CVE-2014-1213
Vulnerability from fkie_nvd - Published: 2014-02-10 23:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof "ready for update" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| sophos | scanning_engine | * | |
| sophos | sophos_anti-virus | 10.0.11 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sophos:scanning_engine:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DA592E6-2BA6-4A69-9D6A-523921D6E45D",
"versionEndIncluding": "3.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:10.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1A5C5A60-26CE-4334-A911-382A452459AD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof \"ready for update\" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects."
},
{
"lang": "es",
"value": "El motor de Sophos Anti-Virus (SAVi) anterior a 3.50.1, utilizado en VDL 4.97G 9.7.x anterior a 9.7.9, 10.0.x anterior a 10.0.11 y 10.3.x anterior a 10.3.1 no establece una ACL para cietos objetos globales y de sesi\u00f3n, lo que permite a usuarios locales evadir la protecci\u00f3n Anti-Virus, causa una denegaci\u00f3n de servicio (consumo de recursos, consumo de CPU y finalmente una ca\u00edda) o falsifica mensajes de \"preparado para actualizaci\u00f3n\" mediante ciertas operaciones realizadas en mutexes o eventos incluyendo (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest o (14) SophosALMonSessionInstance, demostrado mediante la provocaci\u00f3n de un evento ReadyForUpdateSAV y modificaci\u00f3n de objetos UpdateComplete, UpdateMutex y UpdateRequest."
}
],
"id": "CVE-2014-1213",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 7.8,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-02-10T23:55:05.057",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/102762"
},
{
"source": "cve@mitre.org",
"url": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html"
},
{
"source": "cve@mitre.org",
"url": "http://seclists.org/fulldisclosure/2014/Feb/1"
},
{
"source": "cve@mitre.org",
"url": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/530915/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/65286"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id/1029713"
},
{
"source": "cve@mitre.org",
"url": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/102762"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2014/Feb/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/530915/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/65286"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1029713"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-4787
Vulnerability from fkie_nvd - Published: 2007-09-10 21:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
The virus detection engine in Sophos Anti-Virus before 2.49.0 does not properly process malformed (1) CAB, (2) LZH, and (3) RAR files with modified headers, which might allow remote attackers to bypass malware detection.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sophos:scanning_engine:2.30.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6A092119-BF22-4FDC-8922-4993AEAA1327",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "22A1739A-B77D-4CD6-9943-52B336EC2F22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.78:*:*:*:*:*:*:*",
"matchCriteriaId": "40D4EB83-A8A4-48F2-A835-FA192ADB3BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.78d:*:*:*:*:*:*:*",
"matchCriteriaId": "1609D51F-41D1-441C-9EA8-3F0510D8ED8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.79:*:*:*:*:*:*:*",
"matchCriteriaId": "3ABBFB36-0A7C-45ED-9907-867F31884113",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.80:*:*:*:*:*:*:*",
"matchCriteriaId": "23543D87-E4B6-4B74-A490-378D45AA3481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.81:*:*:*:*:*:*:*",
"matchCriteriaId": "E4DBC8E3-0344-413A-8C4A-F48CBAAFAB91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.82:*:*:*:*:*:*:*",
"matchCriteriaId": "28C3AD19-26F4-4AFF-8207-86017509EECC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.83:*:*:*:*:*:*:*",
"matchCriteriaId": "8EFC7217-88A6-4241-8FD9-4B7E2683F696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.84:*:*:*:*:*:*:*",
"matchCriteriaId": "FDC8C9FC-9D35-455D-9597-3B2E63845B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.85:*:*:*:*:*:*:*",
"matchCriteriaId": "E07255F9-5726-4FDB-81A3-D0D55AD1F709",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.86:*:*:*:*:*:*:*",
"matchCriteriaId": "DD1A8D69-0A33-4F47-B1BA-8BC898A3E7EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "06164FCF-CC47-406D-8561-DDA797B29673",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.91:*:*:*:*:*:*:*",
"matchCriteriaId": "A323A588-59DD-4D89-A224-A6FF7BBD7B37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.95:*:*:*:*:*:*:*",
"matchCriteriaId": "B7CDEAF9-0769-4570-8191-DA368938FDFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.96:*:*:*:*:*:*:*",
"matchCriteriaId": "3A5FB0BA-1F4B-46C3-BE36-65CBD184FBFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.04:*:*:*:*:*:*:*",
"matchCriteriaId": "C58081BD-443D-41A7-B21D-A0B6BD3BD3DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.05:*:*:*:*:*:*:*",
"matchCriteriaId": "FB2AEEEC-5F50-42B0-9F04-A608C838FDAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7B0A4880-4C6D-45F4-A9E3-45F89565A70E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "04626D03-3B5D-47F6-A07A-743EB1A64AA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "30C4EDD2-C20F-4837-87B5-41C3A0992B20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "BB106B11-74FD-4CB9-9574-F7F5068E7708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9292DAA0-12B3-44B8-ADA5-000C310E08B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2852BD18-84FD-43A6-A260-8AEEEA8CCB6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0756438F-DD69-4213-9069-FA613A5D729E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E6283405-A087-4CAA-8B7E-9FCA9712C104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F0FB0CD9-91CB-43C5-9CB5-1B3BC665D134",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C9096CCF-D46E-48AE-8357-5F06868A3935",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C7ACD53C-E3D3-4CAE-BA22-A895446DDB58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D1D13F9B-8CCB-4560-961D-00C7A2A9AD9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DD86E1E2-2CDE-4567-B894-D46F7D30D988",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F38D18C6-4F62-4013-A862-0195AEE82A43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:6.5.4_r2:*:*:*:*:*:*:*",
"matchCriteriaId": "B1305099-EC14-4D02-9F26-92D5CC1B324C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:6.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "140C2E15-9C9C-4478-8B6F-97B48AD5F9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:sophos_anti-virus:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEA43C43-167B-43CA-A768-B18E2B422D90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The virus detection engine in Sophos Anti-Virus before 2.49.0 does not properly process malformed (1) CAB, (2) LZH, and (3) RAR files with modified headers, which might allow remote attackers to bypass malware detection."
},
{
"lang": "es",
"value": "El motor de detecci\u00f3n de virus en Sophos Anti-Virus anterior a 2.49.0 no procesa adecuadamente los archivos malformados (1) CAB, (2) LZH, y (3) RAR con cabeceras modificadas, lo cual podr\u00eda permitir a atacantes remotos evitar la detecci\u00f3n de c\u00f3digo malicioso."
}
],
"id": "CVE-2007-4787",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-09-10T21:17:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/37988"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/26726"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/25574"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.sophos.com/support/knowledgebase/article/29146.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/3078"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36502"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/37988"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26726"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/25574"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.sophos.com/support/knowledgebase/article/29146.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/3078"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36502"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-4577
Vulnerability from fkie_nvd - Published: 2007-08-28 18:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a "BZip bomb").
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| sophos | anti-virus | 3.4.6 | |
| sophos | anti-virus | 3.78 | |
| sophos | anti-virus | 3.78d | |
| sophos | anti-virus | 3.79 | |
| sophos | anti-virus | 3.80 | |
| sophos | anti-virus | 3.81 | |
| sophos | anti-virus | 3.82 | |
| sophos | anti-virus | 3.83 | |
| sophos | anti-virus | 3.84 | |
| sophos | anti-virus | 3.85 | |
| sophos | anti-virus | 3.86 | |
| sophos | anti-virus | 3.90 | |
| sophos | anti-virus | 3.91 | |
| sophos | anti-virus | 3.95 | |
| sophos | anti-virus | 3.96.0 | |
| sophos | anti-virus | 4.03 | |
| sophos | anti-virus | 4.04 | |
| sophos | anti-virus | 4.05 | |
| sophos | anti-virus | 4.5.3 | |
| sophos | anti-virus | 4.5.4 | |
| sophos | anti-virus | 4.5.11 | |
| sophos | anti-virus | 4.5.12 | |
| sophos | anti-virus | 4.7.1 | |
| sophos | anti-virus | 4.7.2 | |
| sophos | anti-virus | 5.0.1 | |
| sophos | anti-virus | 5.0.2 | |
| sophos | anti-virus | 5.0.4 | |
| sophos | anti-virus | 5.0.9 | |
| sophos | anti-virus | 5.0.9 | |
| sophos | anti-virus | 5.1 | |
| sophos | anti-virus | 5.2 | |
| sophos | anti-virus | 5.2.1 | |
| sophos | anti-virus | 6.5 | |
| sophos | scanning_engine | 2.30.4 | |
| sophos | scanning_engine | 2.40.2 | |
| sophos | small_business_suite | 4.04 | |
| sophos | small_business_suite | 4.05 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E45839C3-4753-4D22-8FA7-9B0DF6C93414",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.78:*:*:*:*:*:*:*",
"matchCriteriaId": "8DF9F90F-3E38-496F-A84A-45FC60B7613E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.78d:*:*:*:*:*:*:*",
"matchCriteriaId": "A27F909C-E84F-466F-BB40-D43A0570B9C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.79:*:*:*:*:*:*:*",
"matchCriteriaId": "76354221-841C-443C-921A-6242BF875918",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.80:*:*:*:*:*:*:*",
"matchCriteriaId": "245520DD-FDA3-4470-94C9-4A351D028BF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.81:*:*:*:*:*:*:*",
"matchCriteriaId": "147AF135-4638-4015-B1C1-411611C3FC86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.82:*:*:*:*:*:*:*",
"matchCriteriaId": "9BAAFDEA-B08E-4BA9-9333-DFDC35B00D71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.83:*:*:*:*:*:*:*",
"matchCriteriaId": "C4E27696-23CE-4ADD-9859-B0CB1DF02E16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.84:*:*:*:*:*:*:*",
"matchCriteriaId": "44F9357C-2CFC-4866-8D22-E5BE48182D98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.85:*:*:*:*:*:*:*",
"matchCriteriaId": "19A98770-8AF2-4B2D-9783-8E2B01D631E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.86:*:*:*:*:*:*:*",
"matchCriteriaId": "30136876-3778-4C3A-9CE3-0440588594A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "39972E3A-B377-44DC-B16B-AA6E7ECCE29D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.91:*:*:*:*:*:*:*",
"matchCriteriaId": "58B3AE9A-2337-4225-8C1B-87933EE99E18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.95:*:*:*:*:*:*:*",
"matchCriteriaId": "C5922BAB-7DF5-4F65-AC6E-038900B79396",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.96.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5816EC94-1005-4467-825A-6BB43525FE43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.03:*:linux:*:*:*:*:*",
"matchCriteriaId": "DD24F0C5-CB2B-4C67-BD0E-34A1C6358618",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*",
"matchCriteriaId": "7D9D6E1E-9FA4-4BA1-8648-2E1A6A8FC4CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*",
"matchCriteriaId": "799249AD-3E8A-4584-A680-A3E618B5372D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "587205B1-322E-478D-9B46-8F20F371C87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B6B5D4-E335-4377-8D98-87656522D056",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED1228F-0733-42D9-853A-B1EB4EB20A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "136B6228-D71B-4985-B555-5ABC38EF2B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4518D58D-BD49-4E02-AB93-B1B45B774F2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A398BC60-0F67-4A32-A6CD-F3410D81834F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "55D2CFB6-F135-40B5-ACF8-D6513C0AB682",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9B781BEA-E3D6-4260-913F-99D46DCC97D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7952D2-2FE4-44E3-B964-976964CFFB3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "05361082-2A61-40D9-9EEE-6ED3C032FB22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.0.9:*:linux:*:*:*:*:*",
"matchCriteriaId": "98A094D5-C2AD-4DFE-A088-0011268BB65C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E0AF1DE9-A0A1-4193-9AD9-56BF39F3557A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DE7CC4E8-C039-4895-A3EF-BF1927266744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "67E8DF83-4F1B-4E4C-A613-EF0C4502FA5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "41FAD883-919D-4719-A964-C93F40EE658D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:scanning_engine:2.30.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6A092119-BF22-4FDC-8922-4993AEAA1327",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:scanning_engine:2.40.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B4E7AE52-0978-4EBB-8177-CCF792B98DAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:small_business_suite:4.04:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8657D5-7DB2-428D-9125-B3BC4D5F2263",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:small_business_suite:4.05:*:*:*:*:*:*:*",
"matchCriteriaId": "190B0808-8ABD-499C-8A84-7B630BB1E2E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a \"BZip bomb\")."
},
{
"lang": "es",
"value": "Sophos Anti-Virus para Unix/Linux anterior a 2.48.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bucle infinito) mediante un archivo BZip mal formado que resulta en la creaci\u00f3n de m\u00faltiples ficheros Engine temporales (tambi\u00e9n conocida como \"bomba BZip\")."
}
],
"id": "CVE-2007-4577",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-08-28T18:17:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26580"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/3073"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1018608"
},
{
"source": "cve@mitre.org",
"url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/25428"
},
{
"source": "cve@mitre.org",
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/2972"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26580"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/3073"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1018608"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/25428"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/2972"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
},
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-4578
Vulnerability from fkie_nvd - Published: 2007-08-28 18:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an "integer cast around". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| sophos | anti-virus | 3.4.6 | |
| sophos | anti-virus | 3.78 | |
| sophos | anti-virus | 3.78d | |
| sophos | anti-virus | 3.79 | |
| sophos | anti-virus | 3.80 | |
| sophos | anti-virus | 3.81 | |
| sophos | anti-virus | 3.82 | |
| sophos | anti-virus | 3.83 | |
| sophos | anti-virus | 3.84 | |
| sophos | anti-virus | 3.85 | |
| sophos | anti-virus | 3.86 | |
| sophos | anti-virus | 3.90 | |
| sophos | anti-virus | 3.91 | |
| sophos | anti-virus | 3.95 | |
| sophos | anti-virus | 3.96.0 | |
| sophos | anti-virus | 4.03 | |
| sophos | anti-virus | 4.04 | |
| sophos | anti-virus | 4.05 | |
| sophos | anti-virus | 4.5.3 | |
| sophos | anti-virus | 4.5.4 | |
| sophos | anti-virus | 4.5.11 | |
| sophos | anti-virus | 4.5.12 | |
| sophos | anti-virus | 4.7.1 | |
| sophos | anti-virus | 4.7.2 | |
| sophos | anti-virus | 5.0.1 | |
| sophos | anti-virus | 5.0.2 | |
| sophos | anti-virus | 5.0.4 | |
| sophos | anti-virus | 5.0.9 | |
| sophos | anti-virus | 5.0.9 | |
| sophos | anti-virus | 5.1 | |
| sophos | anti-virus | 5.2 | |
| sophos | anti-virus | 5.2.1 | |
| sophos | anti-virus | 6.5 | |
| sophos | scanning_engine | 2.30.4 | |
| sophos | scanning_engine | 2.40.2 | |
| sophos | small_business_suite | 4.04 | |
| sophos | small_business_suite | 4.05 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E45839C3-4753-4D22-8FA7-9B0DF6C93414",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.78:*:*:*:*:*:*:*",
"matchCriteriaId": "8DF9F90F-3E38-496F-A84A-45FC60B7613E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.78d:*:*:*:*:*:*:*",
"matchCriteriaId": "A27F909C-E84F-466F-BB40-D43A0570B9C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.79:*:*:*:*:*:*:*",
"matchCriteriaId": "76354221-841C-443C-921A-6242BF875918",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.80:*:*:*:*:*:*:*",
"matchCriteriaId": "245520DD-FDA3-4470-94C9-4A351D028BF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.81:*:*:*:*:*:*:*",
"matchCriteriaId": "147AF135-4638-4015-B1C1-411611C3FC86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.82:*:*:*:*:*:*:*",
"matchCriteriaId": "9BAAFDEA-B08E-4BA9-9333-DFDC35B00D71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.83:*:*:*:*:*:*:*",
"matchCriteriaId": "C4E27696-23CE-4ADD-9859-B0CB1DF02E16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.84:*:*:*:*:*:*:*",
"matchCriteriaId": "44F9357C-2CFC-4866-8D22-E5BE48182D98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.85:*:*:*:*:*:*:*",
"matchCriteriaId": "19A98770-8AF2-4B2D-9783-8E2B01D631E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.86:*:*:*:*:*:*:*",
"matchCriteriaId": "30136876-3778-4C3A-9CE3-0440588594A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "39972E3A-B377-44DC-B16B-AA6E7ECCE29D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.91:*:*:*:*:*:*:*",
"matchCriteriaId": "58B3AE9A-2337-4225-8C1B-87933EE99E18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.95:*:*:*:*:*:*:*",
"matchCriteriaId": "C5922BAB-7DF5-4F65-AC6E-038900B79396",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:3.96.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5816EC94-1005-4467-825A-6BB43525FE43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.03:*:linux:*:*:*:*:*",
"matchCriteriaId": "DD24F0C5-CB2B-4C67-BD0E-34A1C6358618",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*",
"matchCriteriaId": "7D9D6E1E-9FA4-4BA1-8648-2E1A6A8FC4CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*",
"matchCriteriaId": "799249AD-3E8A-4584-A680-A3E618B5372D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "587205B1-322E-478D-9B46-8F20F371C87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B6B5D4-E335-4377-8D98-87656522D056",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED1228F-0733-42D9-853A-B1EB4EB20A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "136B6228-D71B-4985-B555-5ABC38EF2B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4518D58D-BD49-4E02-AB93-B1B45B774F2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A398BC60-0F67-4A32-A6CD-F3410D81834F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "55D2CFB6-F135-40B5-ACF8-D6513C0AB682",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9B781BEA-E3D6-4260-913F-99D46DCC97D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7952D2-2FE4-44E3-B964-976964CFFB3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "05361082-2A61-40D9-9EEE-6ED3C032FB22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.0.9:*:linux:*:*:*:*:*",
"matchCriteriaId": "98A094D5-C2AD-4DFE-A088-0011268BB65C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E0AF1DE9-A0A1-4193-9AD9-56BF39F3557A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DE7CC4E8-C039-4895-A3EF-BF1927266744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "67E8DF83-4F1B-4E4C-A613-EF0C4502FA5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:anti-virus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "41FAD883-919D-4719-A964-C93F40EE658D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:scanning_engine:2.30.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6A092119-BF22-4FDC-8922-4993AEAA1327",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:scanning_engine:2.40.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B4E7AE52-0978-4EBB-8177-CCF792B98DAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:small_business_suite:4.04:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8657D5-7DB2-428D-9125-B3BC4D5F2263",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sophos:small_business_suite:4.05:*:*:*:*:*:*:*",
"matchCriteriaId": "190B0808-8ABD-499C-8A84-7B630BB1E2E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an \"integer cast around\". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable."
},
{
"lang": "es",
"value": "Sophos Anti-Virus para Windows y para Unix/Linux anterior a 2.48.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un archivo empaquetado con UPX manipulado, resultado de una \"conversi\u00f3n de vuelta de entero\" (integer cast around). NOTA: a fecha de 28/08/2007, el fabricante dice que esto es una denegaci\u00f3n de servicio y el investigador dice que permite ejecuci\u00f3n de c\u00f3digo, pero el investigador es fiable."
}
],
"id": "CVE-2007-4578",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-08-28T18:17:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26580"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/3072"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1018608"
},
{
"source": "cve@mitre.org",
"url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/25428"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/2972"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/26580"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/3072"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1018608"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/25428"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/2972"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2014-1213 (GCVE-0-2014-1213)
Vulnerability from cvelistv5 – Published: 2014-02-10 23:00 – Updated: 2024-08-06 09:34
VLAI?
Summary
Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof "ready for update" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:34:40.459Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html"
},
{
"name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/530915/100/0/threaded"
},
{
"name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2014/Feb/1"
},
{
"name": "102762",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/102762"
},
{
"name": "1029713",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1029713"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/"
},
{
"name": "65286",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/65286"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-01-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof \"ready for update\" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html"
},
{
"name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/530915/100/0/threaded"
},
{
"name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2014/Feb/1"
},
{
"name": "102762",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/102762"
},
{
"name": "1029713",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1029713"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/"
},
{
"name": "65286",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/65286"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-1213",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof \"ready for update\" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx",
"refsource": "CONFIRM",
"url": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx"
},
{
"name": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html"
},
{
"name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/530915/100/0/threaded"
},
{
"name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Feb/1"
},
{
"name": "102762",
"refsource": "OSVDB",
"url": "http://osvdb.org/102762"
},
{
"name": "1029713",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029713"
},
{
"name": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/",
"refsource": "MISC",
"url": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/"
},
{
"name": "65286",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65286"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-1213",
"datePublished": "2014-02-10T23:00:00",
"dateReserved": "2014-01-07T00:00:00",
"dateUpdated": "2024-08-06T09:34:40.459Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4787 (GCVE-0-2007-4787)
Vulnerability from cvelistv5 – Published: 2007-09-10 21:00 – Updated: 2024-08-07 15:08
VLAI?
Summary
The virus detection engine in Sophos Anti-Virus before 2.49.0 does not properly process malformed (1) CAB, (2) LZH, and (3) RAR files with modified headers, which might allow remote attackers to bypass malware detection.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:08:34.165Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "25574",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25574"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sophos.com/support/knowledgebase/article/29146.html"
},
{
"name": "37988",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37988"
},
{
"name": "sophos-archive-security-bypass(36502)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36502"
},
{
"name": "ADV-2007-3078",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3078"
},
{
"name": "26726",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26726"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-09-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The virus detection engine in Sophos Anti-Virus before 2.49.0 does not properly process malformed (1) CAB, (2) LZH, and (3) RAR files with modified headers, which might allow remote attackers to bypass malware detection."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "25574",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25574"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sophos.com/support/knowledgebase/article/29146.html"
},
{
"name": "37988",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37988"
},
{
"name": "sophos-archive-security-bypass(36502)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36502"
},
{
"name": "ADV-2007-3078",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3078"
},
{
"name": "26726",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26726"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4787",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The virus detection engine in Sophos Anti-Virus before 2.49.0 does not properly process malformed (1) CAB, (2) LZH, and (3) RAR files with modified headers, which might allow remote attackers to bypass malware detection."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "25574",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25574"
},
{
"name": "http://www.sophos.com/support/knowledgebase/article/29146.html",
"refsource": "CONFIRM",
"url": "http://www.sophos.com/support/knowledgebase/article/29146.html"
},
{
"name": "37988",
"refsource": "OSVDB",
"url": "http://osvdb.org/37988"
},
{
"name": "sophos-archive-security-bypass(36502)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36502"
},
{
"name": "ADV-2007-3078",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3078"
},
{
"name": "26726",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26726"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4787",
"datePublished": "2007-09-10T21:00:00",
"dateReserved": "2007-09-10T00:00:00",
"dateUpdated": "2024-08-07T15:08:34.165Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4577 (GCVE-0-2007-4577)
Vulnerability from cvelistv5 – Published: 2007-08-28 18:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a "BZip bomb").
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:01:09.876Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-2972",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2972"
},
{
"name": "25428",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25428"
},
{
"name": "26580",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26580"
},
{
"name": "3073",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3073"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"name": "20070824 n.runs-SA-2007.026 - Sophos Antivirus BZip parsing Infinite Loop Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php"
},
{
"name": "1018608",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1018608"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a \"BZip bomb\")."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-2972",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2972"
},
{
"name": "25428",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25428"
},
{
"name": "26580",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26580"
},
{
"name": "3073",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3073"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"name": "20070824 n.runs-SA-2007.026 - Sophos Antivirus BZip parsing Infinite Loop Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php"
},
{
"name": "1018608",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1018608"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4577",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a \"BZip bomb\")."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-2972",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2972"
},
{
"name": "25428",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25428"
},
{
"name": "26580",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26580"
},
{
"name": "3073",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3073"
},
{
"name": "http://www.sophos.com/support/knowledgebase/article/28407.html",
"refsource": "CONFIRM",
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"name": "20070824 n.runs-SA-2007.026 - Sophos Antivirus BZip parsing Infinite Loop Advisory",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded"
},
{
"name": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php",
"refsource": "MISC",
"url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php"
},
{
"name": "1018608",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018608"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4577",
"datePublished": "2007-08-28T18:00:00",
"dateReserved": "2007-08-28T00:00:00",
"dateUpdated": "2024-08-07T15:01:09.876Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4578 (GCVE-0-2007-4578)
Vulnerability from cvelistv5 – Published: 2007-08-28 18:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an "integer cast around". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:01:09.611Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-2972",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2972"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php"
},
{
"name": "25428",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25428"
},
{
"name": "26580",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26580"
},
{
"name": "20070827 Re: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"name": "3072",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3072"
},
{
"name": "20070827 RE: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded"
},
{
"name": "20070824 n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded"
},
{
"name": "1018608",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1018608"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an \"integer cast around\". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-2972",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2972"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php"
},
{
"name": "25428",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25428"
},
{
"name": "26580",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26580"
},
{
"name": "20070827 Re: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"name": "3072",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3072"
},
{
"name": "20070827 RE: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded"
},
{
"name": "20070824 n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded"
},
{
"name": "1018608",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1018608"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4578",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an \"integer cast around\". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-2972",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2972"
},
{
"name": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php",
"refsource": "MISC",
"url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php"
},
{
"name": "25428",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25428"
},
{
"name": "26580",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26580"
},
{
"name": "20070827 Re: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded"
},
{
"name": "http://www.sophos.com/support/knowledgebase/article/28407.html",
"refsource": "CONFIRM",
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"name": "3072",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3072"
},
{
"name": "20070827 RE: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded"
},
{
"name": "20070824 n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded"
},
{
"name": "1018608",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018608"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4578",
"datePublished": "2007-08-28T18:00:00",
"dateReserved": "2007-08-28T00:00:00",
"dateUpdated": "2024-08-07T15:01:09.611Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-1213 (GCVE-0-2014-1213)
Vulnerability from nvd – Published: 2014-02-10 23:00 – Updated: 2024-08-06 09:34
VLAI?
Summary
Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof "ready for update" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:34:40.459Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html"
},
{
"name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/530915/100/0/threaded"
},
{
"name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2014/Feb/1"
},
{
"name": "102762",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/102762"
},
{
"name": "1029713",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1029713"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/"
},
{
"name": "65286",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/65286"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-01-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof \"ready for update\" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html"
},
{
"name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/530915/100/0/threaded"
},
{
"name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2014/Feb/1"
},
{
"name": "102762",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/102762"
},
{
"name": "1029713",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1029713"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/"
},
{
"name": "65286",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/65286"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-1213",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof \"ready for update\" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx",
"refsource": "CONFIRM",
"url": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx"
},
{
"name": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html"
},
{
"name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/530915/100/0/threaded"
},
{
"name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Feb/1"
},
{
"name": "102762",
"refsource": "OSVDB",
"url": "http://osvdb.org/102762"
},
{
"name": "1029713",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029713"
},
{
"name": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/",
"refsource": "MISC",
"url": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/"
},
{
"name": "65286",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65286"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-1213",
"datePublished": "2014-02-10T23:00:00",
"dateReserved": "2014-01-07T00:00:00",
"dateUpdated": "2024-08-06T09:34:40.459Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4787 (GCVE-0-2007-4787)
Vulnerability from nvd – Published: 2007-09-10 21:00 – Updated: 2024-08-07 15:08
VLAI?
Summary
The virus detection engine in Sophos Anti-Virus before 2.49.0 does not properly process malformed (1) CAB, (2) LZH, and (3) RAR files with modified headers, which might allow remote attackers to bypass malware detection.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:08:34.165Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "25574",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25574"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sophos.com/support/knowledgebase/article/29146.html"
},
{
"name": "37988",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37988"
},
{
"name": "sophos-archive-security-bypass(36502)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36502"
},
{
"name": "ADV-2007-3078",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3078"
},
{
"name": "26726",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26726"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-09-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The virus detection engine in Sophos Anti-Virus before 2.49.0 does not properly process malformed (1) CAB, (2) LZH, and (3) RAR files with modified headers, which might allow remote attackers to bypass malware detection."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "25574",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25574"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sophos.com/support/knowledgebase/article/29146.html"
},
{
"name": "37988",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37988"
},
{
"name": "sophos-archive-security-bypass(36502)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36502"
},
{
"name": "ADV-2007-3078",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3078"
},
{
"name": "26726",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26726"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4787",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The virus detection engine in Sophos Anti-Virus before 2.49.0 does not properly process malformed (1) CAB, (2) LZH, and (3) RAR files with modified headers, which might allow remote attackers to bypass malware detection."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "25574",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25574"
},
{
"name": "http://www.sophos.com/support/knowledgebase/article/29146.html",
"refsource": "CONFIRM",
"url": "http://www.sophos.com/support/knowledgebase/article/29146.html"
},
{
"name": "37988",
"refsource": "OSVDB",
"url": "http://osvdb.org/37988"
},
{
"name": "sophos-archive-security-bypass(36502)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36502"
},
{
"name": "ADV-2007-3078",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3078"
},
{
"name": "26726",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26726"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4787",
"datePublished": "2007-09-10T21:00:00",
"dateReserved": "2007-09-10T00:00:00",
"dateUpdated": "2024-08-07T15:08:34.165Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4577 (GCVE-0-2007-4577)
Vulnerability from nvd – Published: 2007-08-28 18:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a "BZip bomb").
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:01:09.876Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-2972",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2972"
},
{
"name": "25428",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25428"
},
{
"name": "26580",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26580"
},
{
"name": "3073",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3073"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"name": "20070824 n.runs-SA-2007.026 - Sophos Antivirus BZip parsing Infinite Loop Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php"
},
{
"name": "1018608",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1018608"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a \"BZip bomb\")."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-2972",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2972"
},
{
"name": "25428",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25428"
},
{
"name": "26580",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26580"
},
{
"name": "3073",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3073"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"name": "20070824 n.runs-SA-2007.026 - Sophos Antivirus BZip parsing Infinite Loop Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php"
},
{
"name": "1018608",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1018608"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4577",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a \"BZip bomb\")."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-2972",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2972"
},
{
"name": "25428",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25428"
},
{
"name": "26580",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26580"
},
{
"name": "3073",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3073"
},
{
"name": "http://www.sophos.com/support/knowledgebase/article/28407.html",
"refsource": "CONFIRM",
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"name": "20070824 n.runs-SA-2007.026 - Sophos Antivirus BZip parsing Infinite Loop Advisory",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded"
},
{
"name": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php",
"refsource": "MISC",
"url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php"
},
{
"name": "1018608",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018608"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4577",
"datePublished": "2007-08-28T18:00:00",
"dateReserved": "2007-08-28T00:00:00",
"dateUpdated": "2024-08-07T15:01:09.876Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-4578 (GCVE-0-2007-4578)
Vulnerability from nvd – Published: 2007-08-28 18:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an "integer cast around". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:01:09.611Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-2972",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2972"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php"
},
{
"name": "25428",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25428"
},
{
"name": "26580",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26580"
},
{
"name": "20070827 Re: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"name": "3072",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3072"
},
{
"name": "20070827 RE: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded"
},
{
"name": "20070824 n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded"
},
{
"name": "1018608",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1018608"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an \"integer cast around\". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-2972",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2972"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php"
},
{
"name": "25428",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25428"
},
{
"name": "26580",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26580"
},
{
"name": "20070827 Re: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"name": "3072",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3072"
},
{
"name": "20070827 RE: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded"
},
{
"name": "20070824 n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded"
},
{
"name": "1018608",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1018608"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-4578",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an \"integer cast around\". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-2972",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2972"
},
{
"name": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php",
"refsource": "MISC",
"url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php"
},
{
"name": "25428",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25428"
},
{
"name": "26580",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26580"
},
{
"name": "20070827 Re: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded"
},
{
"name": "http://www.sophos.com/support/knowledgebase/article/28407.html",
"refsource": "CONFIRM",
"url": "http://www.sophos.com/support/knowledgebase/article/28407.html"
},
{
"name": "3072",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3072"
},
{
"name": "20070827 RE: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded"
},
{
"name": "20070824 n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded"
},
{
"name": "1018608",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018608"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-4578",
"datePublished": "2007-08-28T18:00:00",
"dateReserved": "2007-08-28T00:00:00",
"dateUpdated": "2024-08-07T15:01:09.611Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}