Описание
Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0.
Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-5646
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452
- http://secunia.com/advisories/22591
- http://securitytracker.com/id?1017132
- http://www.securityfocus.com/bid/20816
- http://www.sophos.com/support/knowledgebase/article/7609.html
- http://www.vupen.com/english/advisories/2006/4239
Связанные уязвимости
Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0.