VAR-200607-0033
Vulnerability from variot - Updated: 2023-12-18 13:35F-Secure Anti-Virus 2003 through 2006 and other versions, Internet Security 2003 through 2006, and Service Platform for Service Providers 6.x and earlier does not scan files contained on removable media when "Scan network drives" is disabled, which allows remote attackers to bypass anti-virus controls. Multiple products by F-Secure are prone to scan-evasion vulnerabilities. Exploitation of these vulnerabilities may result in a false sense of security and in the execution of malicious applications. This could potentially lead to a malicious code infection.
Want to join the Secunia Security Team?
Secunia offers a position as a security specialist, where your daily work involves reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports.
1) An unspecified error within the handling of executable programs where the name has been manipulated in a certain way can be exploited to bypass the anti-virus scanning functionality.
2) An error causes files on removable media to not be scanned when the "Scan network devices" option has been disabled.
SOLUTION: Apply patches (see patch matrix in the vendor's advisory).
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: F-Secure: http://www.f-secure.com/security/fsc-2006-4.shtml
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200607-0033",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "f-secure anti-virus",
"scope": "eq",
"trust": 1.6,
"vendor": "f secure",
"version": "5.52"
},
{
"model": "f-secure internet security",
"scope": "eq",
"trust": 1.6,
"vendor": "f secure",
"version": "2005"
},
{
"model": "f-secure internet security",
"scope": "eq",
"trust": 1.6,
"vendor": "f secure",
"version": "2003"
},
{
"model": "f-secure internet security",
"scope": "eq",
"trust": 1.6,
"vendor": "f secure",
"version": "2006"
},
{
"model": "f-secure internet security",
"scope": "eq",
"trust": 1.6,
"vendor": "f secure",
"version": "2004"
},
{
"model": "f-secure anti-virus",
"scope": "lte",
"trust": 1.0,
"vendor": "f secure",
"version": "5.52"
},
{
"model": "f-secure anti-virus",
"scope": "eq",
"trust": 1.0,
"vendor": "f secure",
"version": "2004"
},
{
"model": "f-secure anti-virus",
"scope": "eq",
"trust": 1.0,
"vendor": "f secure",
"version": "5.51"
},
{
"model": "f-secure anti-virus",
"scope": "eq",
"trust": 1.0,
"vendor": "f secure",
"version": "5.5"
},
{
"model": "f-secure service platform for service providers",
"scope": "eq",
"trust": 1.0,
"vendor": "f secure",
"version": "*"
},
{
"model": "f-secure anti-virus",
"scope": "lte",
"trust": 1.0,
"vendor": "f secure",
"version": "6.01"
},
{
"model": "f-secure anti-virus",
"scope": "lte",
"trust": 1.0,
"vendor": "f secure",
"version": "5.61"
},
{
"model": "f-secure anti-virus",
"scope": "eq",
"trust": 1.0,
"vendor": "f secure",
"version": "2003"
},
{
"model": "f-secure anti-virus",
"scope": "lte",
"trust": 1.0,
"vendor": "f secure",
"version": "5.44"
},
{
"model": "f-secure anti-virus",
"scope": "eq",
"trust": 1.0,
"vendor": "f secure",
"version": "2005"
},
{
"model": "f-secure anti-virus",
"scope": "eq",
"trust": 1.0,
"vendor": "f secure",
"version": "2006"
},
{
"model": "f-secure anti-virus",
"scope": "eq",
"trust": 0.6,
"vendor": "f secure",
"version": "5.61"
},
{
"model": "f-secure anti-virus",
"scope": "eq",
"trust": 0.6,
"vendor": "f secure",
"version": "5.44"
},
{
"model": "f-secure service platform for service providers",
"scope": null,
"trust": 0.6,
"vendor": "f secure",
"version": null
},
{
"model": "f-secure anti-virus",
"scope": "eq",
"trust": 0.6,
"vendor": "f secure",
"version": "6.01"
},
{
"model": "service platform for service providers",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "6"
},
{
"model": "personal express",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.10"
},
{
"model": "personal express",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.0"
},
{
"model": "personal express",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "4.7"
},
{
"model": "personal express",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "4.6"
},
{
"model": "personal express",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "4.5"
},
{
"model": "internet security",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "20060"
},
{
"model": "internet security",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "2005"
},
{
"model": "internet security",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "2004"
},
{
"model": "internet security",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "2003"
},
{
"model": "anti-virus for workstations",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.44"
},
{
"model": "anti-virus for workstations",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.43"
},
{
"model": "anti-virus for workstations",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.42"
},
{
"model": "anti-virus for workstations",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.41"
},
{
"model": "anti-virus for workstations",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.40"
},
{
"model": "anti-virus for windows servers",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.52"
},
{
"model": "anti-virus for windows servers",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.50"
},
{
"model": "anti-virus for windows servers",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.42"
},
{
"model": "anti-virus for windows servers",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.41"
},
{
"model": "anti-virus for mimesweeper",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.61"
},
{
"model": "anti-virus for mimesweeper",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.51"
},
{
"model": "anti-virus for mimesweeper",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.50"
},
{
"model": "anti-virus for mimesweeper",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.42"
},
{
"model": "anti-virus for mimesweeper",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.41"
},
{
"model": "anti-virus for citrix servers",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.52"
},
{
"model": "anti-virus for citrix servers",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.5"
},
{
"model": "anti-virus client security",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "6.01"
},
{
"model": "anti-virus client security",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.55"
},
{
"model": "anti-virus client security",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.54"
},
{
"model": "anti-virus client security",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.52"
},
{
"model": "anti-virus client security",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "5.50"
},
{
"model": "anti-virus",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "20060"
},
{
"model": "anti-virus",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "2005"
},
{
"model": "anti-virus",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "2004"
},
{
"model": "anti-virus",
"scope": "eq",
"trust": 0.3,
"vendor": "f secure",
"version": "2003"
}
],
"sources": [
{
"db": "BID",
"id": "18693"
},
{
"db": "NVD",
"id": "CVE-2006-3490"
},
{
"db": "CNNVD",
"id": "CNNVD-200607-105"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:2003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_internet_security:2005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:citrix_servers:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.51:*:citrix_servers:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:workstations:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.44",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:windows_servers:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.52",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:2005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:2006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_internet_security:2006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_service_platform_for_service_providers:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:citrix_servers:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_internet_security:2003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:mimesweeper:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.61",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:client_security:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.01",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2006-3490"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "F-Secure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200607-105"
}
],
"trust": 0.6
},
"cve": "CVE-2006-3490",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-19598",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2006-3490",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200607-105",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-19598",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-19598"
},
{
"db": "NVD",
"id": "CVE-2006-3490"
},
{
"db": "CNNVD",
"id": "CNNVD-200607-105"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "F-Secure Anti-Virus 2003 through 2006 and other versions, Internet Security 2003 through 2006, and Service Platform for Service Providers 6.x and earlier does not scan files contained on removable media when \"Scan network drives\" is disabled, which allows remote attackers to bypass anti-virus controls. Multiple products by F-Secure are prone to scan-evasion vulnerabilities. \nExploitation of these vulnerabilities may result in a false sense of security and in the execution of malicious applications. This could potentially lead to a malicious code infection. \n\n----------------------------------------------------------------------\n\nWant to join the Secunia Security Team?\n\nSecunia offers a position as a security specialist, where your daily\nwork involves reverse engineering of software and exploit code,\nauditing of source code, and analysis of vulnerability reports. \n\n1) An unspecified error within the handling of executable programs\nwhere the name has been manipulated in a certain way can be exploited\nto bypass the anti-virus scanning functionality. \n\n2) An error causes files on removable media to not be scanned when\nthe \"Scan network devices\" option has been disabled. \n\nSOLUTION:\nApply patches (see patch matrix in the vendor\u0027s advisory). \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nF-Secure:\nhttp://www.f-secure.com/security/fsc-2006-4.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2006-3490"
},
{
"db": "BID",
"id": "18693"
},
{
"db": "VULHUB",
"id": "VHN-19598"
},
{
"db": "PACKETSTORM",
"id": "47832"
}
],
"trust": 1.35
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "18693",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "20858",
"trust": 1.8
},
{
"db": "NVD",
"id": "CVE-2006-3490",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1016400",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1016401",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2006-2573",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "26876",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-200607-105",
"trust": 0.7
},
{
"db": "XF",
"id": "27502",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-19598",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "47832",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-19598"
},
{
"db": "BID",
"id": "18693"
},
{
"db": "PACKETSTORM",
"id": "47832"
},
{
"db": "NVD",
"id": "CVE-2006-3490"
},
{
"db": "CNNVD",
"id": "CNNVD-200607-105"
}
]
},
"id": "VAR-200607-0033",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-19598"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:35:34.664000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2006-3490"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.1,
"url": "http://www.f-secure.com/security/fsc-2006-4.shtml"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/18693"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/26876"
},
{
"trust": 1.7,
"url": "http://securitytracker.com/id?1016400"
},
{
"trust": 1.7,
"url": "http://securitytracker.com/id?1016401"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/20858"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2006/2573"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27502"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2006/2573"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/27502"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/457/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/2718/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/455/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_specialist/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/4299/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/452/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/4300/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/6883/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/5786/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/20858/"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/6885/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/5198/"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/3500/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/6882/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/3499/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-19598"
},
{
"db": "BID",
"id": "18693"
},
{
"db": "PACKETSTORM",
"id": "47832"
},
{
"db": "NVD",
"id": "CVE-2006-3490"
},
{
"db": "CNNVD",
"id": "CNNVD-200607-105"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-19598"
},
{
"db": "BID",
"id": "18693"
},
{
"db": "PACKETSTORM",
"id": "47832"
},
{
"db": "NVD",
"id": "CVE-2006-3490"
},
{
"db": "CNNVD",
"id": "CNNVD-200607-105"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2006-07-10T00:00:00",
"db": "VULHUB",
"id": "VHN-19598"
},
{
"date": "2006-06-28T00:00:00",
"db": "BID",
"id": "18693"
},
{
"date": "2006-06-29T02:11:18",
"db": "PACKETSTORM",
"id": "47832"
},
{
"date": "2006-07-10T22:05:00",
"db": "NVD",
"id": "CVE-2006-3490"
},
{
"date": "2006-07-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200607-105"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-20T00:00:00",
"db": "VULHUB",
"id": "VHN-19598"
},
{
"date": "2006-06-28T19:00:00",
"db": "BID",
"id": "18693"
},
{
"date": "2017-07-20T01:32:20.710000",
"db": "NVD",
"id": "CVE-2006-3490"
},
{
"date": "2006-08-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200607-105"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200607-105"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "F-Secure Anti-Virus/ Internet Security/Service Platform for Service Providers Escape scanning vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200607-105"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200607-105"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.