Clam AntiVirus (ClamAV) 0.88.6 allows remote attackers to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/21461 | vdb entry |
http://kolab.org/security/kolab-vendor-notice-14.txt | |
http://secunia.com/advisories/23460 | third party advisory |
http://www.vupen.com/english/advisories/2006/4948 | vdb entry |
http://www.debian.org/security/2006/dsa-1238 | vendor advisory |
http://www.novell.com/linux/security/advisories/2006_78_clamav.html | vendor advisory |
http://www.securityfocus.com/archive/1/453654/100/0/threaded | mailing list |
http://secunia.com/advisories/23379 | third party advisory |
http://www.quantenblog.net/security/virus-scanner-bypass | exploit vendor advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:230 | vendor advisory |
http://www.vupen.com/english/advisories/2006/5113 | vdb entry |
http://secunia.com/advisories/23411 | third party advisory |
http://secunia.com/advisories/23362 | third party advisory |