All the vulnerabilites related to sophos - scanning_engine
Vulnerability from fkie_nvd
Published
2007-08-28 18:17
Modified
2024-11-21 00:35
Severity ?
Summary
Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an "integer cast around". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sophos | anti-virus | 3.4.6 | |
sophos | anti-virus | 3.78 | |
sophos | anti-virus | 3.78d | |
sophos | anti-virus | 3.79 | |
sophos | anti-virus | 3.80 | |
sophos | anti-virus | 3.81 | |
sophos | anti-virus | 3.82 | |
sophos | anti-virus | 3.83 | |
sophos | anti-virus | 3.84 | |
sophos | anti-virus | 3.85 | |
sophos | anti-virus | 3.86 | |
sophos | anti-virus | 3.90 | |
sophos | anti-virus | 3.91 | |
sophos | anti-virus | 3.95 | |
sophos | anti-virus | 3.96.0 | |
sophos | anti-virus | 4.03 | |
sophos | anti-virus | 4.04 | |
sophos | anti-virus | 4.05 | |
sophos | anti-virus | 4.5.3 | |
sophos | anti-virus | 4.5.4 | |
sophos | anti-virus | 4.5.11 | |
sophos | anti-virus | 4.5.12 | |
sophos | anti-virus | 4.7.1 | |
sophos | anti-virus | 4.7.2 | |
sophos | anti-virus | 5.0.1 | |
sophos | anti-virus | 5.0.2 | |
sophos | anti-virus | 5.0.4 | |
sophos | anti-virus | 5.0.9 | |
sophos | anti-virus | 5.0.9 | |
sophos | anti-virus | 5.1 | |
sophos | anti-virus | 5.2 | |
sophos | anti-virus | 5.2.1 | |
sophos | anti-virus | 6.5 | |
sophos | scanning_engine | 2.30.4 | |
sophos | scanning_engine | 2.40.2 | |
sophos | small_business_suite | 4.04 | |
sophos | small_business_suite | 4.05 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:anti-virus:3.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E45839C3-4753-4D22-8FA7-9B0DF6C93414", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.78:*:*:*:*:*:*:*", "matchCriteriaId": "8DF9F90F-3E38-496F-A84A-45FC60B7613E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.78d:*:*:*:*:*:*:*", "matchCriteriaId": "A27F909C-E84F-466F-BB40-D43A0570B9C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.79:*:*:*:*:*:*:*", "matchCriteriaId": "76354221-841C-443C-921A-6242BF875918", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.80:*:*:*:*:*:*:*", "matchCriteriaId": "245520DD-FDA3-4470-94C9-4A351D028BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.81:*:*:*:*:*:*:*", "matchCriteriaId": "147AF135-4638-4015-B1C1-411611C3FC86", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.82:*:*:*:*:*:*:*", "matchCriteriaId": "9BAAFDEA-B08E-4BA9-9333-DFDC35B00D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.83:*:*:*:*:*:*:*", "matchCriteriaId": "C4E27696-23CE-4ADD-9859-B0CB1DF02E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.84:*:*:*:*:*:*:*", "matchCriteriaId": "44F9357C-2CFC-4866-8D22-E5BE48182D98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.85:*:*:*:*:*:*:*", "matchCriteriaId": "19A98770-8AF2-4B2D-9783-8E2B01D631E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.86:*:*:*:*:*:*:*", "matchCriteriaId": "30136876-3778-4C3A-9CE3-0440588594A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.90:*:*:*:*:*:*:*", "matchCriteriaId": "39972E3A-B377-44DC-B16B-AA6E7ECCE29D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.91:*:*:*:*:*:*:*", "matchCriteriaId": "58B3AE9A-2337-4225-8C1B-87933EE99E18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.95:*:*:*:*:*:*:*", "matchCriteriaId": "C5922BAB-7DF5-4F65-AC6E-038900B79396", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.96.0:*:*:*:*:*:*:*", "matchCriteriaId": "5816EC94-1005-4467-825A-6BB43525FE43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.03:*:linux:*:*:*:*:*", "matchCriteriaId": "DD24F0C5-CB2B-4C67-BD0E-34A1C6358618", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "7D9D6E1E-9FA4-4BA1-8648-2E1A6A8FC4CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "799249AD-3E8A-4584-A680-A3E618B5372D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "587205B1-322E-478D-9B46-8F20F371C87C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B9B6B5D4-E335-4377-8D98-87656522D056", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ED1228F-0733-42D9-853A-B1EB4EB20A91", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "136B6228-D71B-4985-B555-5ABC38EF2B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4518D58D-BD49-4E02-AB93-B1B45B774F2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "A398BC60-0F67-4A32-A6CD-F3410D81834F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55D2CFB6-F135-40B5-ACF8-D6513C0AB682", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B781BEA-E3D6-4260-913F-99D46DCC97D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4D7952D2-2FE4-44E3-B964-976964CFFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "05361082-2A61-40D9-9EEE-6ED3C032FB22", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.9:*:linux:*:*:*:*:*", "matchCriteriaId": "98A094D5-C2AD-4DFE-A088-0011268BB65C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0AF1DE9-A0A1-4193-9AD9-56BF39F3557A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7CC4E8-C039-4895-A3EF-BF1927266744", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "67E8DF83-4F1B-4E4C-A613-EF0C4502FA5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "41FAD883-919D-4719-A964-C93F40EE658D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:scanning_engine:2.30.4:*:*:*:*:*:*:*", "matchCriteriaId": "6A092119-BF22-4FDC-8922-4993AEAA1327", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:scanning_engine:2.40.2:*:*:*:*:*:*:*", "matchCriteriaId": "B4E7AE52-0978-4EBB-8177-CCF792B98DAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:small_business_suite:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "9B8657D5-7DB2-428D-9125-B3BC4D5F2263", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:small_business_suite:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "190B0808-8ABD-499C-8A84-7B630BB1E2E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an \"integer cast around\". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable." }, { "lang": "es", "value": "Sophos Anti-Virus para Windows y para Unix/Linux anterior a 2.48.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un archivo empaquetado con UPX manipulado, resultado de una \"conversi\u00f3n de vuelta de entero\" (integer cast around). NOTA: a fecha de 28/08/2007, el fabricante dice que esto es una denegaci\u00f3n de servicio y el investigador dice que permite ejecuci\u00f3n de c\u00f3digo, pero el investigador es fiable." } ], "id": "CVE-2007-4578", "lastModified": "2024-11-21T00:35:56.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-08-28T18:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26580" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3072" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018608" }, { "source": "cve@mitre.org", "url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25428" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3072" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2972" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-08-28 18:17
Modified
2024-11-21 00:35
Severity ?
Summary
Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a "BZip bomb").
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sophos | anti-virus | 3.4.6 | |
sophos | anti-virus | 3.78 | |
sophos | anti-virus | 3.78d | |
sophos | anti-virus | 3.79 | |
sophos | anti-virus | 3.80 | |
sophos | anti-virus | 3.81 | |
sophos | anti-virus | 3.82 | |
sophos | anti-virus | 3.83 | |
sophos | anti-virus | 3.84 | |
sophos | anti-virus | 3.85 | |
sophos | anti-virus | 3.86 | |
sophos | anti-virus | 3.90 | |
sophos | anti-virus | 3.91 | |
sophos | anti-virus | 3.95 | |
sophos | anti-virus | 3.96.0 | |
sophos | anti-virus | 4.03 | |
sophos | anti-virus | 4.04 | |
sophos | anti-virus | 4.05 | |
sophos | anti-virus | 4.5.3 | |
sophos | anti-virus | 4.5.4 | |
sophos | anti-virus | 4.5.11 | |
sophos | anti-virus | 4.5.12 | |
sophos | anti-virus | 4.7.1 | |
sophos | anti-virus | 4.7.2 | |
sophos | anti-virus | 5.0.1 | |
sophos | anti-virus | 5.0.2 | |
sophos | anti-virus | 5.0.4 | |
sophos | anti-virus | 5.0.9 | |
sophos | anti-virus | 5.0.9 | |
sophos | anti-virus | 5.1 | |
sophos | anti-virus | 5.2 | |
sophos | anti-virus | 5.2.1 | |
sophos | anti-virus | 6.5 | |
sophos | scanning_engine | 2.30.4 | |
sophos | scanning_engine | 2.40.2 | |
sophos | small_business_suite | 4.04 | |
sophos | small_business_suite | 4.05 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:anti-virus:3.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E45839C3-4753-4D22-8FA7-9B0DF6C93414", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.78:*:*:*:*:*:*:*", "matchCriteriaId": "8DF9F90F-3E38-496F-A84A-45FC60B7613E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.78d:*:*:*:*:*:*:*", "matchCriteriaId": "A27F909C-E84F-466F-BB40-D43A0570B9C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.79:*:*:*:*:*:*:*", "matchCriteriaId": "76354221-841C-443C-921A-6242BF875918", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.80:*:*:*:*:*:*:*", "matchCriteriaId": "245520DD-FDA3-4470-94C9-4A351D028BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.81:*:*:*:*:*:*:*", "matchCriteriaId": "147AF135-4638-4015-B1C1-411611C3FC86", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.82:*:*:*:*:*:*:*", "matchCriteriaId": "9BAAFDEA-B08E-4BA9-9333-DFDC35B00D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.83:*:*:*:*:*:*:*", "matchCriteriaId": "C4E27696-23CE-4ADD-9859-B0CB1DF02E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.84:*:*:*:*:*:*:*", "matchCriteriaId": "44F9357C-2CFC-4866-8D22-E5BE48182D98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.85:*:*:*:*:*:*:*", "matchCriteriaId": "19A98770-8AF2-4B2D-9783-8E2B01D631E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.86:*:*:*:*:*:*:*", "matchCriteriaId": "30136876-3778-4C3A-9CE3-0440588594A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.90:*:*:*:*:*:*:*", "matchCriteriaId": "39972E3A-B377-44DC-B16B-AA6E7ECCE29D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.91:*:*:*:*:*:*:*", "matchCriteriaId": "58B3AE9A-2337-4225-8C1B-87933EE99E18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.95:*:*:*:*:*:*:*", "matchCriteriaId": "C5922BAB-7DF5-4F65-AC6E-038900B79396", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.96.0:*:*:*:*:*:*:*", "matchCriteriaId": "5816EC94-1005-4467-825A-6BB43525FE43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.03:*:linux:*:*:*:*:*", "matchCriteriaId": "DD24F0C5-CB2B-4C67-BD0E-34A1C6358618", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "7D9D6E1E-9FA4-4BA1-8648-2E1A6A8FC4CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "799249AD-3E8A-4584-A680-A3E618B5372D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "587205B1-322E-478D-9B46-8F20F371C87C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B9B6B5D4-E335-4377-8D98-87656522D056", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ED1228F-0733-42D9-853A-B1EB4EB20A91", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "136B6228-D71B-4985-B555-5ABC38EF2B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4518D58D-BD49-4E02-AB93-B1B45B774F2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "A398BC60-0F67-4A32-A6CD-F3410D81834F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55D2CFB6-F135-40B5-ACF8-D6513C0AB682", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B781BEA-E3D6-4260-913F-99D46DCC97D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4D7952D2-2FE4-44E3-B964-976964CFFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "05361082-2A61-40D9-9EEE-6ED3C032FB22", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.9:*:linux:*:*:*:*:*", "matchCriteriaId": "98A094D5-C2AD-4DFE-A088-0011268BB65C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0AF1DE9-A0A1-4193-9AD9-56BF39F3557A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7CC4E8-C039-4895-A3EF-BF1927266744", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "67E8DF83-4F1B-4E4C-A613-EF0C4502FA5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "41FAD883-919D-4719-A964-C93F40EE658D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:scanning_engine:2.30.4:*:*:*:*:*:*:*", "matchCriteriaId": "6A092119-BF22-4FDC-8922-4993AEAA1327", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:scanning_engine:2.40.2:*:*:*:*:*:*:*", "matchCriteriaId": "B4E7AE52-0978-4EBB-8177-CCF792B98DAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:small_business_suite:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "9B8657D5-7DB2-428D-9125-B3BC4D5F2263", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:small_business_suite:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "190B0808-8ABD-499C-8A84-7B630BB1E2E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a \"BZip bomb\")." }, { "lang": "es", "value": "Sophos Anti-Virus para Unix/Linux anterior a 2.48.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bucle infinito) mediante un archivo BZip mal formado que resulta en la creaci\u00f3n de m\u00faltiples ficheros Engine temporales (tambi\u00e9n conocida como \"bomba BZip\")." } ], "id": "CVE-2007-4577", "lastModified": "2024-11-21T00:35:56.053", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-08-28T18:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26580" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3073" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018608" }, { "source": "cve@mitre.org", "url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/25428" }, { "source": "cve@mitre.org", "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/25428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2972" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-09-10 21:17
Modified
2024-11-21 00:36
Severity ?
Summary
The virus detection engine in Sophos Anti-Virus before 2.49.0 does not properly process malformed (1) CAB, (2) LZH, and (3) RAR files with modified headers, which might allow remote attackers to bypass malware detection.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:scanning_engine:2.30.4:*:*:*:*:*:*:*", "matchCriteriaId": "6A092119-BF22-4FDC-8922-4993AEAA1327", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "22A1739A-B77D-4CD6-9943-52B336EC2F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.78:*:*:*:*:*:*:*", "matchCriteriaId": "40D4EB83-A8A4-48F2-A835-FA192ADB3BFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.78d:*:*:*:*:*:*:*", "matchCriteriaId": "1609D51F-41D1-441C-9EA8-3F0510D8ED8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.79:*:*:*:*:*:*:*", "matchCriteriaId": "3ABBFB36-0A7C-45ED-9907-867F31884113", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.80:*:*:*:*:*:*:*", "matchCriteriaId": "23543D87-E4B6-4B74-A490-378D45AA3481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.81:*:*:*:*:*:*:*", "matchCriteriaId": "E4DBC8E3-0344-413A-8C4A-F48CBAAFAB91", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.82:*:*:*:*:*:*:*", "matchCriteriaId": "28C3AD19-26F4-4AFF-8207-86017509EECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.83:*:*:*:*:*:*:*", "matchCriteriaId": "8EFC7217-88A6-4241-8FD9-4B7E2683F696", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.84:*:*:*:*:*:*:*", "matchCriteriaId": "FDC8C9FC-9D35-455D-9597-3B2E63845B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.85:*:*:*:*:*:*:*", "matchCriteriaId": "E07255F9-5726-4FDB-81A3-D0D55AD1F709", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.86:*:*:*:*:*:*:*", "matchCriteriaId": "DD1A8D69-0A33-4F47-B1BA-8BC898A3E7EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.90:*:*:*:*:*:*:*", "matchCriteriaId": "06164FCF-CC47-406D-8561-DDA797B29673", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.91:*:*:*:*:*:*:*", "matchCriteriaId": "A323A588-59DD-4D89-A224-A6FF7BBD7B37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.95:*:*:*:*:*:*:*", "matchCriteriaId": "B7CDEAF9-0769-4570-8191-DA368938FDFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:3.96:*:*:*:*:*:*:*", "matchCriteriaId": "3A5FB0BA-1F4B-46C3-BE36-65CBD184FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "C58081BD-443D-41A7-B21D-A0B6BD3BD3DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "FB2AEEEC-5F50-42B0-9F04-A608C838FDAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "7B0A4880-4C6D-45F4-A9E3-45F89565A70E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "04626D03-3B5D-47F6-A07A-743EB1A64AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "30C4EDD2-C20F-4837-87B5-41C3A0992B20", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "BB106B11-74FD-4CB9-9574-F7F5068E7708", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "9292DAA0-12B3-44B8-ADA5-000C310E08B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "2852BD18-84FD-43A6-A260-8AEEEA8CCB6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0756438F-DD69-4213-9069-FA613A5D729E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E6283405-A087-4CAA-8B7E-9FCA9712C104", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F0FB0CD9-91CB-43C5-9CB5-1B3BC665D134", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9096CCF-D46E-48AE-8357-5F06868A3935", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C7ACD53C-E3D3-4CAE-BA22-A895446DDB58", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D1D13F9B-8CCB-4560-961D-00C7A2A9AD9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD86E1E2-2CDE-4567-B894-D46F7D30D988", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "F38D18C6-4F62-4013-A862-0195AEE82A43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:6.5.4_r2:*:*:*:*:*:*:*", "matchCriteriaId": "B1305099-EC14-4D02-9F26-92D5CC1B324C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:6.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "140C2E15-9C9C-4478-8B6F-97B48AD5F9B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEA43C43-167B-43CA-A768-B18E2B422D90", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The virus detection engine in Sophos Anti-Virus before 2.49.0 does not properly process malformed (1) CAB, (2) LZH, and (3) RAR files with modified headers, which might allow remote attackers to bypass malware detection." }, { "lang": "es", "value": "El motor de detecci\u00f3n de virus en Sophos Anti-Virus anterior a 2.49.0 no procesa adecuadamente los archivos malformados (1) CAB, (2) LZH, y (3) RAR con cabeceras modificadas, lo cual podr\u00eda permitir a atacantes remotos evitar la detecci\u00f3n de c\u00f3digo malicioso." } ], "id": "CVE-2007-4787", "lastModified": "2024-11-21T00:36:27.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-09-10T21:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/37988" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26726" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/25574" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.sophos.com/support/knowledgebase/article/29146.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3078" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36502" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/37988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26726" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/25574" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.sophos.com/support/knowledgebase/article/29146.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36502" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-02-10 23:55
Modified
2024-11-21 02:03
Severity ?
Summary
Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof "ready for update" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sophos | scanning_engine | * | |
sophos | sophos_anti-virus | 10.0.11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:scanning_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DA592E6-2BA6-4A69-9D6A-523921D6E45D", "versionEndIncluding": "3.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:10.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "1A5C5A60-26CE-4334-A911-382A452459AD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof \"ready for update\" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects." }, { "lang": "es", "value": "El motor de Sophos Anti-Virus (SAVi) anterior a 3.50.1, utilizado en VDL 4.97G 9.7.x anterior a 9.7.9, 10.0.x anterior a 10.0.11 y 10.3.x anterior a 10.3.1 no establece una ACL para cietos objetos globales y de sesi\u00f3n, lo que permite a usuarios locales evadir la protecci\u00f3n Anti-Virus, causa una denegaci\u00f3n de servicio (consumo de recursos, consumo de CPU y finalmente una ca\u00edda) o falsifica mensajes de \"preparado para actualizaci\u00f3n\" mediante ciertas operaciones realizadas en mutexes o eventos incluyendo (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest o (14) SophosALMonSessionInstance, demostrado mediante la provocaci\u00f3n de un evento ReadyForUpdateSAV y modificaci\u00f3n de objetos UpdateComplete, UpdateMutex y UpdateRequest." } ], "id": "CVE-2014-1213", "lastModified": "2024-11-21T02:03:51.847", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 5.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 7.8, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-10T23:55:05.057", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/102762" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2014/Feb/1" }, { "source": "cve@mitre.org", "url": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/530915/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/65286" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1029713" }, { "source": "cve@mitre.org", "url": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/102762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2014/Feb/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/530915/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2007-4577
Vulnerability from cvelistv5
Published
2007-08-28 18:00
Modified
2024-08-07 15:01
Severity ?
EPSS score ?
Summary
Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a "BZip bomb").
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/2972 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/25428 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/26580 | third-party-advisory, x_refsource_SECUNIA | |
http://securityreason.com/securityalert/3073 | third-party-advisory, x_refsource_SREASON | |
http://www.sophos.com/support/knowledgebase/article/28407.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/477727/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php | x_refsource_MISC | |
http://securitytracker.com/id?1018608 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:01:09.876Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-2972", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "name": "25428", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25428" }, { "name": "26580", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26580" }, { "name": "3073", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3073" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "name": "20070824 n.runs-SA-2007.026 - Sophos Antivirus BZip parsing Infinite Loop Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php" }, { "name": "1018608", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018608" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a \"BZip bomb\")." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-2972", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "name": "25428", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25428" }, { "name": "26580", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26580" }, { "name": "3073", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3073" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "name": "20070824 n.runs-SA-2007.026 - Sophos Antivirus BZip parsing Infinite Loop Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php" }, { "name": "1018608", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018608" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4577", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a \"BZip bomb\")." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-2972", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "name": "25428", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25428" }, { "name": "26580", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26580" }, { "name": "3073", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3073" }, { "name": "http://www.sophos.com/support/knowledgebase/article/28407.html", "refsource": "CONFIRM", "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "name": "20070824 n.runs-SA-2007.026 - Sophos Antivirus BZip parsing Infinite Loop Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded" }, { "name": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php", "refsource": "MISC", "url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php" }, { "name": "1018608", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018608" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4577", "datePublished": "2007-08-28T18:00:00", "dateReserved": "2007-08-28T00:00:00", "dateUpdated": "2024-08-07T15:01:09.876Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4578
Vulnerability from cvelistv5
Published
2007-08-28 18:00
Modified
2024-08-07 15:01
Severity ?
EPSS score ?
Summary
Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an "integer cast around". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/2972 | vdb-entry, x_refsource_VUPEN | |
http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php | x_refsource_MISC | |
http://www.securityfocus.com/bid/25428 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/26580 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/477864/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.sophos.com/support/knowledgebase/article/28407.html | x_refsource_CONFIRM | |
http://securityreason.com/securityalert/3072 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/477882/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/archive/1/477720/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securitytracker.com/id?1018608 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:01:09.611Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-2972", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php" }, { "name": "25428", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25428" }, { "name": "26580", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26580" }, { "name": "20070827 Re: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "name": "3072", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3072" }, { "name": "20070827 RE: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded" }, { "name": "20070824 n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded" }, { "name": "1018608", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018608" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an \"integer cast around\". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-2972", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php" }, { "name": "25428", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25428" }, { "name": "26580", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26580" }, { "name": "20070827 Re: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "name": "3072", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3072" }, { "name": "20070827 RE: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded" }, { "name": "20070824 n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded" }, { "name": "1018608", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018608" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4578", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an \"integer cast around\". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-2972", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "name": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php", "refsource": "MISC", "url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php" }, { "name": "25428", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25428" }, { "name": "26580", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26580" }, { "name": "20070827 Re: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded" }, { "name": "http://www.sophos.com/support/knowledgebase/article/28407.html", "refsource": "CONFIRM", "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "name": "3072", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3072" }, { "name": "20070827 RE: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded" }, { "name": "20070824 n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded" }, { "name": "1018608", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018608" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4578", "datePublished": "2007-08-28T18:00:00", "dateReserved": "2007-08-28T00:00:00", "dateUpdated": "2024-08-07T15:01:09.611Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-1213
Vulnerability from cvelistv5
Published
2014-02-10 23:00
Modified
2024-08-06 09:34
Severity ?
EPSS score ?
Summary
Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof "ready for update" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects.
References
▼ | URL | Tags |
---|---|---|
http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/530915/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://seclists.org/fulldisclosure/2014/Feb/1 | mailing-list, x_refsource_FULLDISC | |
http://osvdb.org/102762 | vdb-entry, x_refsource_OSVDB | |
http://www.securitytracker.com/id/1029713 | vdb-entry, x_refsource_SECTRACK | |
http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/ | x_refsource_MISC | |
http://www.securityfocus.com/bid/65286 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:34:40.459Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html" }, { "name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/530915/100/0/threaded" }, { "name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Feb/1" }, { "name": "102762", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/102762" }, { "name": "1029713", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029713" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/" }, { "name": "65286", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65286" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof \"ready for update\" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html" }, { "name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/530915/100/0/threaded" }, { "name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Feb/1" }, { "name": "102762", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/102762" }, { "name": "1029713", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029713" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/" }, { "name": "65286", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65286" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-1213", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof \"ready for update\" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx", "refsource": "CONFIRM", "url": "http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx" }, { "name": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html" }, { "name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/530915/100/0/threaded" }, { "name": "20140131 CVE-2014-1213 - Denial of Service in Sophos Anti Virus", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Feb/1" }, { "name": "102762", "refsource": "OSVDB", "url": "http://osvdb.org/102762" }, { "name": "1029713", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029713" }, { "name": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/", "refsource": "MISC", "url": "http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/" }, { "name": "65286", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65286" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-1213", "datePublished": "2014-02-10T23:00:00", "dateReserved": "2014-01-07T00:00:00", "dateUpdated": "2024-08-06T09:34:40.459Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4787
Vulnerability from cvelistv5
Published
2007-09-10 21:00
Modified
2024-08-07 15:08
Severity ?
EPSS score ?
Summary
The virus detection engine in Sophos Anti-Virus before 2.49.0 does not properly process malformed (1) CAB, (2) LZH, and (3) RAR files with modified headers, which might allow remote attackers to bypass malware detection.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/25574 | vdb-entry, x_refsource_BID | |
http://www.sophos.com/support/knowledgebase/article/29146.html | x_refsource_CONFIRM | |
http://osvdb.org/37988 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36502 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2007/3078 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/26726 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:08:34.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25574", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25574" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/29146.html" }, { "name": "37988", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/37988" }, { "name": "sophos-archive-security-bypass(36502)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36502" }, { "name": "ADV-2007-3078", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3078" }, { "name": "26726", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26726" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The virus detection engine in Sophos Anti-Virus before 2.49.0 does not properly process malformed (1) CAB, (2) LZH, and (3) RAR files with modified headers, which might allow remote attackers to bypass malware detection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25574", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25574" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/support/knowledgebase/article/29146.html" }, { "name": "37988", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/37988" }, { "name": "sophos-archive-security-bypass(36502)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36502" }, { "name": "ADV-2007-3078", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3078" }, { "name": "26726", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26726" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4787", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The virus detection engine in Sophos Anti-Virus before 2.49.0 does not properly process malformed (1) CAB, (2) LZH, and (3) RAR files with modified headers, which might allow remote attackers to bypass malware detection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25574", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25574" }, { "name": "http://www.sophos.com/support/knowledgebase/article/29146.html", "refsource": "CONFIRM", "url": "http://www.sophos.com/support/knowledgebase/article/29146.html" }, { "name": "37988", "refsource": "OSVDB", "url": "http://osvdb.org/37988" }, { "name": "sophos-archive-security-bypass(36502)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36502" }, { "name": "ADV-2007-3078", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3078" }, { "name": "26726", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26726" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4787", "datePublished": "2007-09-10T21:00:00", "dateReserved": "2007-09-10T00:00:00", "dateUpdated": "2024-08-07T15:08:34.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }