4.3
CVSSv2

CVE-2017-6418

Published: 07/08/2017 Updated: 21/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

libclamav/message.c in ClamAV 0.99.2 allows remote malicious users to cause a denial of service (out-of-bounds read) via a crafted e-mail message.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

clamav clamav 0.99.2

Vendor Advisories

Debian Bug report logs - #888484 clamav: Security release 0993 available (CVE-2017-12374 CVE-2017-12375 CVE-2017-12376 CVE-2017-12377 CVE-2017-12378 CVE-2017-12379 CVE-2017-12380) Package: clamav; Maintainer for clamav is ClamAV Team <pkg-clamav-devel@listsaliothdebianorg>; Source for clamav is src:clamav (PTS, buildd, popcon) ...
Several security issues were fixed in ClamAV ...
Several security issues were fixed in ClamAV ...
Heap-based buffer overflow in mspack/lzxdc:mspack/lzxdc in libmspack 05alpha, as used in ClamAV 0992, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted CHM file(CVE-2017-6419) The wwunpack function in libclamav/wwunpackc in ClamAV 0 ...
libclamav/messagec in ClamAV before 0993 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted e-mail message ...