Skip to main content
定价企业版
首页/漏洞/EDB-4862
EDB-4862remotelinux已验证

ClamAV 0.91.2 - libclamav MEW PE Buffer Overflow

Thomas Pollet1/7/2008
在Exploit-DB查看在GitLab查看源代码

AI分析AI驱动

漏洞利用代码

Exploit code not available in database

在GitLab查看源代码

相关CVE (2)

CVE-2007-6335

NONE

Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.

Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.

12/20/2007CWE-189

CVE-2007-5759

NONE

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6335. Reason: This candidate is a duplicate of CVE-2007-6335. Notes: All CVE users should reference CVE-2007-6335 instead of

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6335. Reason: This candidate is a duplicate of CVE-2007-6335. Notes: All CVE users should reference CVE-2007-6335 instead of ...

12/20/2007

漏洞利用信息

EDB ID
4862
类型
remote
平台
linux
已验证
是
发布日期
2008-01-07

关联的CVE

CVE-2007-6335CVE-2007-5759

快速操作

下载原始文件在Google搜索
免责声明:此漏洞利用代码仅供教育和授权的安全研究目的使用。请负责任地使用,并仅在您有权测试的系统上使用。