Upstream information

CVE-2006-1615 at MITRE

Description

Multiple format string vulnerabilities in the logging code in Clam AntiVirus (ClamAV) before 0.88.1 might allow remote attackers to execute arbitrary code. NOTE: as of 20060410, it is unclear whether this is a vulnerability, as there is some evidence that the arguments are actually being sanitized properly.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having critical severity.

CVSS v2 Scores
CVSS detail National Vulnerability Database
Base Score 10
Vector AV:N/AC:L/Au:N/C:C/I:C/A:C
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
SUSE Bugzilla entry: 164039 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Server 16.0
  • clamav >= 1.4.3-160000.2.2
  • clamav-devel >= 1.4.3-160000.2.2
  • clamav-docs-html >= 1.4.3-160000.2.2
  • clamav-milter >= 1.4.3-160000.2.2
  • libclamav12 >= 1.4.3-160000.2.2
  • libclammspack0 >= 1.4.3-160000.2.2
  • libfreshclam3 >= 1.4.3-160000.2.2
Patchnames:
SUSE Linux Enterprise Server 16.0 GA clamav-1.4.3-160000.2.2


SUSE Timeline for this CVE

CVE page created: Fri Jun 28 02:08:49 2013
CVE page last modified: Sun Nov 2 12:15:20 2025