Upstream information
Description
Multiple format string vulnerabilities in the logging code in Clam AntiVirus (ClamAV) before 0.88.1 might allow remote attackers to execute arbitrary code. NOTE: as of 20060410, it is unclear whether this is a vulnerability, as there is some evidence that the arguments are actually being sanitized properly.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having critical severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 10 | 
| Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C | 
| Access Vector | Network | 
| Access Complexity | Low | 
| Authentication | None | 
| Confidentiality Impact | Complete | 
| Integrity Impact | Complete | 
| Availability Impact | Complete | 
SUSE Security Advisories:
- SUSE-SA:2006:020, published Tue, 11 Apr 2006 15:00:00 +0000
 
List of released packages
| Product(s) | Fixed package version(s) | References | 
|---|---|---|
| SUSE Linux Enterprise Server 16.0 | 
  |  Patchnames:  SUSE Linux Enterprise Server 16.0 GA clamav-1.4.3-160000.2.2  | 
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 02:08:49 2013CVE page last modified: Sun Nov 2 12:15:20 2025