var-200601-0369
Vulnerability from variot

Multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allow remote attackers to hide arbitrary files and data via malformed (1) RAR and (2) ZIP archives, which are not properly scanned. F-Secure is prone to multiple vulnerabilities when handling archives of various formats. The application is affected by a remote buffer overflow vulnerability when handling malformed ZIP archives. A successful attack can facilitate arbitrary code execution and result in a full compromise. Specially crafted ZIP and RAR archives can also bypass detection. This may result in arbitrary code execution or a malicious code infection.

TITLE: F-Secure Anti-Virus Archive Handling Vulnerabilities

SECUNIA ADVISORY ID: SA18529

VERIFY ADVISORY: http://secunia.com/advisories/18529/

CRITICAL: Highly critical

IMPACT: Security Bypass, System access

WHERE:

From remote

SOFTWARE: F-Secure Personal Express 6.x http://secunia.com/product/6885/ F-Secure Internet Security 2006 http://secunia.com/product/6883/ F-Secure Internet Security 2005 http://secunia.com/product/4300/ F-Secure Internet Security 2004 http://secunia.com/product/3499/ F-Secure Internet Gatekeeper for Linux 2.x http://secunia.com/product/4635/ F-Secure Internet Gatekeeper 6.x http://secunia.com/product/3339/ F-Secure Anti-Virus for Workstations 5.x http://secunia.com/product/457/ F-Secure Anti-Virus for Windows Servers 5.x http://secunia.com/product/452/ F-Secure Anti-Virus for Samba Servers 4.x http://secunia.com/product/3501/ F-Secure Anti-Virus for MIMEsweeper 5.x http://secunia.com/product/455/ F-Secure Anti-Virus for Microsoft Exchange 6.x http://secunia.com/product/454/ F-Secure Anti-Virus for Linux 4.x http://secunia.com/product/3165/ F-Secure Anti-Virus for Firewalls 6.x http://secunia.com/product/451/ F-Secure Anti-Virus for Citrix Servers 5.x http://secunia.com/product/5198/ F-Secure Anti-Virus Client Security 6.x http://secunia.com/product/5786/ F-Secure Anti-Virus Client Security 5.x http://secunia.com/product/2718/ F-Secure Anti-Virus 5.x http://secunia.com/product/3334/ F-Secure Anti-Virus 2006 http://secunia.com/product/6882/ F-Secure Anti-Virus 2005 http://secunia.com/product/4299/ F-Secure Anti-Virus 2004 http://secunia.com/product/3500/

DESCRIPTION: Some vulnerabilities have been reported in various F-Secure products, which can be exploited by malware to bypass detection or malicious people to compromise a vulnerable system.

2) An error in the scanning functionality when processing RAR and ZIP archives can be exploited to prevent malware from being detected.

PROVIDED AND/OR DISCOVERED BY: The vendor credits Thierry Zoller.

ORIGINAL ADVISORY: http://www.f-secure.com/security/fsc-2006-1.shtml

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200601-0369",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "f secure",
        "version": "6.40"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "f secure",
        "version": "6.21"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "f secure",
        "version": "6.01"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "f secure",
        "version": "6.2"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "f secure",
        "version": "6.31"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "f secure",
        "version": "6.30"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "f secure",
        "version": "5.55"
      },
      {
        "model": "f-secure internet security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "f secure",
        "version": "2005"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "f secure",
        "version": "6.30_sr1"
      },
      {
        "model": "internet gatekeeper",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "f secure",
        "version": "6.41"
      },
      {
        "model": "internet gatekeeper",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "f secure",
        "version": "6.32"
      },
      {
        "model": "internet gatekeeper",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "f secure",
        "version": "6.42"
      },
      {
        "model": "internet gatekeeper",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "2.14"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "4.51"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "5.52"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "4.60"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "5.41"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "5.42"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "2004"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "4.64"
      },
      {
        "model": "f-secure personal express",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "5.0"
      },
      {
        "model": "internet gatekeeper",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "2.06"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "4.61"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "2003"
      },
      {
        "model": "f-secure personal express",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "4.5"
      },
      {
        "model": "f-secure personal express",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "4.6"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "2005"
      },
      {
        "model": "f-secure internet security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "2004"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "4.52"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "5.11"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "5.5"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "4.62"
      },
      {
        "model": "f-secure personal express",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "4.7"
      },
      {
        "model": "f-secure internet security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "2006"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "5.44"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "5.0"
      },
      {
        "model": "f-secure anti-virus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "f secure",
        "version": "5.43"
      },
      {
        "model": "internet gatekeeper for linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "2.6"
      },
      {
        "model": "anti-virus client security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.52"
      },
      {
        "model": "anti-virus for ms exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "6.2"
      },
      {
        "model": "anti-virus for windows servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.52"
      },
      {
        "model": "anti-virus for linux gateways",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "4.64"
      },
      {
        "model": "anti-virus for workstations",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.43"
      },
      {
        "model": "anti-virus for linux servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "4.64"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "2005"
      },
      {
        "model": "internet security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "20060"
      },
      {
        "model": "anti-virus for ms exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "6.21"
      },
      {
        "model": "anti-virus for windows servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.41"
      },
      {
        "model": "anti-virus for linux gateways",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "2.16"
      },
      {
        "model": "anti-virus for linux gateways",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "4.61"
      },
      {
        "model": "anti-virus linux client security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.11"
      },
      {
        "model": "anti-virus for windows servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.42"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "2004"
      },
      {
        "model": "anti-virus for windows servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.50"
      },
      {
        "model": "anti-virus for linux servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "4.61"
      },
      {
        "model": "anti-virus for mimesweeper",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.61"
      },
      {
        "model": "anti-virus for ms exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "6.31"
      },
      {
        "model": "anti-virus for citrix servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.5"
      },
      {
        "model": "anti-virus for citrix servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.52"
      },
      {
        "model": "anti-virus for ms exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "6.40"
      },
      {
        "model": "anti-virus for ms exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "6.01"
      },
      {
        "model": "anti-virus linux client security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.01"
      },
      {
        "model": "internet gatekeeper for linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "2.06"
      },
      {
        "model": "internet gatekeeper",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "6.400"
      },
      {
        "model": "anti-virus linux server security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.11"
      },
      {
        "model": "anti-virus for linux gateways",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "4.52"
      },
      {
        "model": "anti-virus for linux servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "4.52"
      },
      {
        "model": "anti-virus client security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.55"
      },
      {
        "model": "internet gatekeeper for linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "2.14"
      },
      {
        "model": "anti-virus for ms exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "6.30"
      },
      {
        "model": "anti-virus client security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.50"
      },
      {
        "model": "anti-virus linux client security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.0"
      },
      {
        "model": "internet gatekeeper",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "6.31"
      },
      {
        "model": "anti-virus for ms exchange service release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "6.301"
      },
      {
        "model": "internet security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "2005"
      },
      {
        "model": "anti-virus for workstations",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.44"
      },
      {
        "model": "internet security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "2004"
      },
      {
        "model": "anti-virus for mimesweeper",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.50"
      },
      {
        "model": "anti-virus for linux gateways",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "4.51"
      },
      {
        "model": "anti-virus for firewalls",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "6.20"
      },
      {
        "model": "anti-virus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "20060"
      },
      {
        "model": "anti-virus for linux workstations",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "4.52"
      },
      {
        "model": "anti-virus for workstations",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.40"
      },
      {
        "model": "anti-virus linux server security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.01"
      },
      {
        "model": "anti-virus for linux servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "4.51"
      },
      {
        "model": "anti-virus client security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.54"
      },
      {
        "model": "anti-virus for linux workstations",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "4.51"
      },
      {
        "model": "anti-virus client security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "6.01"
      },
      {
        "model": "anti-virus for workstations",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.41"
      },
      {
        "model": "internet gatekeeper",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "6.3"
      },
      {
        "model": "anti-virus for mimesweeper",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.41"
      },
      {
        "model": "anti-virus linux server security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.0"
      },
      {
        "model": "anti-virus for workstations",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.42"
      },
      {
        "model": "anti-virus for samba servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "4.62"
      },
      {
        "model": "anti-virus for mimesweeper",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.42"
      },
      {
        "model": "solutions based on f-secure personal express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "6.20"
      },
      {
        "model": "anti-virus for mimesweeper",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "f secure",
        "version": "5.51"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "16309"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0338"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-264"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_servers:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:2005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_servers:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.62:*:samba_servers:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_gateways:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:workstations:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:mimesweeper:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:citrix_servers:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:ms_exchange:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_internet_security:2006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_personal_express:4.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:internet_gatekeeper:6.42:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_servers:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:linux_client_security:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:windows_servers:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:workstations:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:mimesweeper:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:windows_servers:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30:*:ms_exchange:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30_sr1:*:ms_exchange:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_personal_express:4.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_personal_express:4.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:2003:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_gateways:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_servers:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.11:*:linux_server_security:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:mimesweeper:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:mimesweeper:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:windows_servers:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:ms_exchange:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:firewalls:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_internet_security:2005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:internet_gatekeeper:6.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_workstations:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:linux_server_security:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.11:*:linux_client_security:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.43:*:workstations:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.44:*:workstations:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.55:*:client_security:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:client_security:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.31:*:ms_exchange:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.40:*:ms_exchange:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_personal_express:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:internet_gatekeeper:2.06:*:linux:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:f-secure:internet_gatekeeper:2.14:*:linux:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-0338"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Thierry Zoller is credited with the discovery of these issues.",
    "sources": [
      {
        "db": "BID",
        "id": "16309"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-264"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2006-0338",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-16446",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2006-0338",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200601-264",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-16446",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-16446"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0338"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-264"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allow remote attackers to hide arbitrary files and data via malformed (1) RAR and (2) ZIP archives, which are not properly scanned. F-Secure is prone to multiple vulnerabilities when handling archives of various formats. \nThe application is affected by a remote buffer overflow vulnerability when handling malformed ZIP archives.  A successful attack can facilitate arbitrary code execution and result in a full compromise. \nSpecially crafted ZIP and RAR archives can also bypass detection.  This may result in arbitrary code execution or a malicious code infection. \n\nTITLE:\nF-Secure Anti-Virus Archive Handling Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA18529\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/18529/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nSecurity Bypass, System access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nF-Secure Personal Express 6.x\nhttp://secunia.com/product/6885/\nF-Secure Internet Security 2006\nhttp://secunia.com/product/6883/\nF-Secure Internet Security 2005\nhttp://secunia.com/product/4300/\nF-Secure Internet Security 2004\nhttp://secunia.com/product/3499/\nF-Secure Internet Gatekeeper for Linux 2.x\nhttp://secunia.com/product/4635/\nF-Secure Internet Gatekeeper 6.x\nhttp://secunia.com/product/3339/\nF-Secure Anti-Virus for Workstations 5.x\nhttp://secunia.com/product/457/\nF-Secure Anti-Virus for Windows Servers 5.x\nhttp://secunia.com/product/452/\nF-Secure Anti-Virus for Samba Servers 4.x\nhttp://secunia.com/product/3501/\nF-Secure Anti-Virus for MIMEsweeper 5.x\nhttp://secunia.com/product/455/\nF-Secure Anti-Virus for Microsoft Exchange 6.x\nhttp://secunia.com/product/454/\nF-Secure Anti-Virus for Linux 4.x\nhttp://secunia.com/product/3165/\nF-Secure Anti-Virus for Firewalls 6.x\nhttp://secunia.com/product/451/\nF-Secure Anti-Virus for Citrix Servers 5.x\nhttp://secunia.com/product/5198/\nF-Secure Anti-Virus Client Security 6.x\nhttp://secunia.com/product/5786/\nF-Secure Anti-Virus Client Security 5.x\nhttp://secunia.com/product/2718/\nF-Secure Anti-Virus 5.x\nhttp://secunia.com/product/3334/\nF-Secure Anti-Virus 2006\nhttp://secunia.com/product/6882/\nF-Secure Anti-Virus 2005\nhttp://secunia.com/product/4299/\nF-Secure Anti-Virus 2004\nhttp://secunia.com/product/3500/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in various F-Secure products,\nwhich can be exploited by malware to bypass detection or malicious\npeople to compromise a vulnerable system. \n\n2) An error in the scanning functionality when processing RAR and ZIP\narchives can be exploited to prevent malware from being detected. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Thierry Zoller. \n\nORIGINAL ADVISORY:\nhttp://www.f-secure.com/security/fsc-2006-1.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-0338"
      },
      {
        "db": "BID",
        "id": "16309"
      },
      {
        "db": "VULHUB",
        "id": "VHN-16446"
      },
      {
        "db": "PACKETSTORM",
        "id": "43189"
      }
    ],
    "trust": 1.35
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "16309",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "18529",
        "trust": 1.8
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0338",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "22633",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-0257",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1015507",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1015508",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1015509",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1015510",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-264",
        "trust": 0.7
      },
      {
        "db": "CIAC",
        "id": "Q-103",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "24199",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-16446",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "43189",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-16446"
      },
      {
        "db": "BID",
        "id": "16309"
      },
      {
        "db": "PACKETSTORM",
        "id": "43189"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0338"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-264"
      }
    ]
  },
  "id": "VAR-200601-0369",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-16446"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:25:58.206000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-0338"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://www.f-secure.com/security/fsc-2006-1.shtml"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/16309"
      },
      {
        "trust": 1.7,
        "url": "http://www.ciac.org/ciac/bulletins/q-103.shtml"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/22633"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1015507"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1015508"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1015509"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1015510"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/18529"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2006/0257"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24199"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/0257"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/24199"
      },
      {
        "trust": 0.3,
        "url": "http://www.f-secure.com/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/457/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/454/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/3334/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/2718/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/455/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4299/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/18529/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/452/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6883/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4300/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/5786/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/3339/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6885/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/5198/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/3500/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6882/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/3501/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4635/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/3165/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/3499/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/451/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-16446"
      },
      {
        "db": "BID",
        "id": "16309"
      },
      {
        "db": "PACKETSTORM",
        "id": "43189"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0338"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-264"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-16446"
      },
      {
        "db": "BID",
        "id": "16309"
      },
      {
        "db": "PACKETSTORM",
        "id": "43189"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0338"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-264"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-01-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-16446"
      },
      {
        "date": "2006-01-19T00:00:00",
        "db": "BID",
        "id": "16309"
      },
      {
        "date": "2006-01-19T17:33:40",
        "db": "PACKETSTORM",
        "id": "43189"
      },
      {
        "date": "2006-01-21T00:03:00",
        "db": "NVD",
        "id": "CVE-2006-0338"
      },
      {
        "date": "2006-01-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200601-264"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-16446"
      },
      {
        "date": "2006-02-07T20:54:00",
        "db": "BID",
        "id": "16309"
      },
      {
        "date": "2017-07-20T01:29:40.317000",
        "db": "NVD",
        "id": "CVE-2006-0338"
      },
      {
        "date": "2006-08-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200601-264"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-264"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "F-Secure Multiple Archive File Handling Vulnerabilities",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-264"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-264"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.