CVE-2006-1989

Public Exploit

Description

Buffer overflow in the get_database function in the HTTP client in Freshclam in ClamAV 0.80 to 0.88.1 might allow remote web servers to execute arbitrary code via long HTTP headers.

5.1
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 4.49% Top 15%
Vendor Advisory apple.com Vendor Advisory mandriva.com Vendor Advisory trustix.org Vendor Advisory novell.com Vendor Advisory suse.com Vendor Advisory debian.org Vendor Advisory gentoo.org Vendor Advisory secunia.com Vendor Advisory clamav.net
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://lists.apple.com/archives/security-announce/2006/Jun/msg00000.html vendor advisory
http://secunia.com/advisories/20159 third party advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:080 vendor advisory
http://www.kb.cert.org/vuls/id/599220 third party advisory us government resource
http://secunia.com/advisories/19963 third party advisory
http://www.vupen.com/english/advisories/2006/1586 vdb entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/26182 vdb entry
http://securitytracker.com/id?1016392 vdb entry
http://secunia.com/advisories/19964 third party advisory
http://www.trustix.org/errata/2006/0024 vendor advisory
http://secunia.com/advisories/19912 third party advisory
http://www.novell.com/linux/security/advisories/2006_05_05.html vendor advisory
http://secunia.com/advisories/19880 exploit third party advisory patch vendor advisory
http://www.clamav.net/security/0.88.2.html exploit vendor advisory
http://kolab.org/security/kolab-vendor-notice-09.txt
http://www.osvdb.org/25120 vdb entry
http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html vendor advisory
http://secunia.com/advisories/20117 third party advisory
http://www.debian.org/security/2006/dsa-1050 vendor advisory
http://www.gentoo.org/security/en/glsa/glsa-200605-03.xml vendor advisory
http://secunia.com/advisories/20877 third party advisory
http://www.vupen.com/english/advisories/2006/2566 vdb entry
http://www.securityfocus.com/bid/17754 vdb entry patch
http://secunia.com/advisories/19874 third party advisory

Frequently Asked Questions

What is the severity of CVE-2006-1989?
CVE-2006-1989 has been scored as a medium severity vulnerability.
How to fix CVE-2006-1989?
To fix CVE-2006-1989, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2006-1989 being actively exploited in the wild?
It is possible that CVE-2006-1989 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~4% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.