CERTA-2006-AVI-554
Vulnerability from certfr_avis - Published: - Updated:
Deux failles de sécurité de l'antivirus Sophos permettent à un utilisateur malveillant de compromettre à distance le système vulnérable.
Description
Une erreur existe dans la bibliothèque veex.dll lors du traitemement d'archives au format CPIO. Une autre erreur existe dans la même bibliothèque lors du traitement des archives au format SIT (stuffit). Par l'utilisation d'un nom de fichier extrêmement long et non terminé par un caractère null, un utilisateur distant peut créer un débordement de mémoire et exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sophos antivirus 6.x pour Windows.",
"product": {
"name": "N/A",
"vendor": {
"name": "Sophos",
"scada": false
}
}
},
{
"description": "Sophos antivirus 4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Sophos",
"scada": false
}
}
},
{
"description": "Sophos antivirus 3.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Sophos",
"scada": false
}
}
},
{
"description": "Sophos antivirus 5.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Sophos",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne erreur existe dans la biblioth\u00e8que veex.dll lors du traitemement\nd\u0027archives au format CPIO. Une autre erreur existe dans la m\u00eame\nbiblioth\u00e8que lors du traitement des archives au format SIT (stuffit).\nPar l\u0027utilisation d\u0027un nom de fichier extr\u00eamement long et non termin\u00e9\npar un caract\u00e8re null, un utilisateur distant peut cr\u00e9er un d\u00e9bordement\nde m\u00e9moire et ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-6335",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6335"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 17340 Sophos du 14 d\u00e9cembre 2006 :",
"url": "http://www.sophos.com/support/knowledgebase/article/17340.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 21637 Sophos du 14 d\u00e9cembre 2006 :",
"url": "http://www.sophos.com/support/knowledgebase/article/21637.html"
}
],
"reference": "CERTA-2006-AVI-554",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2006-12-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Deux failles de s\u00e9curit\u00e9 de l\u0027antivirus Sophos permettent \u00e0 un\nutilisateur malveillant de compromettre \u00e0 distance le syst\u00e8me\nvuln\u00e9rable.\n",
"title": "Vuln\u00e9rabilit\u00e9 de l\u0027antivirus Sophos",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Sophos du 14 d\u00e9cembre 2006",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…