Vulnerability Description
Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sophos | Anti-Virus | 4.04 |
| Sophos | Endpoint Security | <= 6.04 |
Related Weaknesses (CWE)
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452
- http://secunia.com/advisories/22591Vendor Advisory
- http://securitytracker.com/id?1017132
- http://www.securityfocus.com/bid/20816
- http://www.sophos.com/support/knowledgebase/article/7609.html
- http://www.vupen.com/english/advisories/2006/4239Vendor Advisory
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452
- http://secunia.com/advisories/22591Vendor Advisory
- http://securitytracker.com/id?1017132
- http://www.securityfocus.com/bid/20816
- http://www.sophos.com/support/knowledgebase/article/7609.html
- http://www.vupen.com/english/advisories/2006/4239Vendor Advisory
FAQ
What is CVE-2006-5646?
CVE-2006-5646 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote...
How severe is CVE-2006-5646?
CVE-2006-5646 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5646?
Check the references section above for vendor advisories and patch information. Affected products include: Sophos Anti-Virus, Sophos Endpoint Security.