CERTA-2006-AVI-554
Vulnerability from certfr_avis

Deux failles de sécurité de l'antivirus Sophos permettent à un utilisateur malveillant de compromettre à distance le système vulnérable.

Description

Une erreur existe dans la bibliothèque veex.dll lors du traitemement d'archives au format CPIO. Une autre erreur existe dans la même bibliothèque lors du traitement des archives au format SIT (stuffit). Par l'utilisation d'un nom de fichier extrêmement long et non terminé par un caractère null, un utilisateur distant peut créer un débordement de mémoire et exécuter du code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Sophos N/A Sophos antivirus 6.x pour Windows.
Sophos N/A Sophos antivirus 4.x ;
Sophos N/A Sophos antivirus 3.x ;
Sophos N/A Sophos antivirus 5.x ;

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Sophos antivirus 6.x pour Windows.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Sophos",
          "scada": false
        }
      }
    },
    {
      "description": "Sophos antivirus 4.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Sophos",
          "scada": false
        }
      }
    },
    {
      "description": "Sophos antivirus 3.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Sophos",
          "scada": false
        }
      }
    },
    {
      "description": "Sophos antivirus 5.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Sophos",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUne erreur existe dans la biblioth\u00e8que veex.dll lors du traitemement\nd\u0027archives au format CPIO. Une autre erreur existe dans la m\u00eame\nbiblioth\u00e8que lors du traitement des archives au format SIT (stuffit).\nPar l\u0027utilisation d\u0027un nom de fichier extr\u00eamement long et non termin\u00e9\npar un caract\u00e8re null, un utilisateur distant peut cr\u00e9er un d\u00e9bordement\nde m\u00e9moire et ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2006-6335",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-6335"
    }
  ],
  "initial_release_date": "2006-12-14T00:00:00",
  "last_revision_date": "2006-12-14T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 17340 Sophos du 14 d\u00e9cembre 2006 :",
      "url": "http://www.sophos.com/support/knowledgebase/article/17340.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 21637 Sophos du 14 d\u00e9cembre 2006 :",
      "url": "http://www.sophos.com/support/knowledgebase/article/21637.html"
    }
  ],
  "reference": "CERTA-2006-AVI-554",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2006-12-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Deux failles de s\u00e9curit\u00e9 de l\u0027antivirus Sophos permettent \u00e0 un\nutilisateur malveillant de compromettre \u00e0 distance le syst\u00e8me\nvuln\u00e9rable.\n",
  "title": "Vuln\u00e9rabilit\u00e9 de l\u0027antivirus Sophos",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletins de s\u00e9curit\u00e9 Sophos du 14 d\u00e9cembre 2006",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…