Multiple buffer overflows in Sophos Anti-Virus scanning engine before 2.40 allow remote attackers to execute arbitrary code via (1) a SIT archive with a long filename that is not null-terminated, which triggers a heap-based overflow in veex.dll due to improper length calculation, and (2) a CPIO archive, with a long filename that is not null-terminated, which triggers a stack-based overflow in veex.dll.
Link | Tags |
---|---|
http://www.zerodayinitiative.com/advisories/ZDI-06-046.html | patch vendor advisory |
http://www.sophos.com/support/knowledgebase/article/17340.html | vendor advisory |
http://www.securityfocus.com/bid/21563 | vdb entry |
http://www.securityfocus.com/archive/1/454197/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30852 | vdb entry |
http://www.securityfocus.com/archive/1/454211/100/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2006/4919 | vdb entry |
http://secunia.com/advisories/23325 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30851 | vdb entry |
http://www.sophos.com/support/knowledgebase/article/21637.html | vendor advisory |
http://www.zerodayinitiative.com/advisories/ZDI-06-045.html | patch vendor advisory |