2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2010-1640" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2010-05-26T18:30:01.827" ,
"lastModified" : "2023-02-13T04:19:27.087" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Off-by-one error in the parseicon function in libclamav/pe_icons.c in ClamAV 0.96 allows remote attackers to cause a denial of service (crash) via a crafted PE icon that triggers an out-of-bounds read, related to improper rounding during scaling."
} ,
{
"lang" : "es" ,
"value" : "Error de superaci\u00f3n de l\u00edmite (Off-by-one) en la funci\u00f3n parseicon en libclamav/pe_icons.c in ClamAV v0.96 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un icono manipulado PE que lanza una lectura fuera de l\u00edmites, relacionado con un redondeo inadecuado durante el escalado. \r\n"
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 4.3
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-189"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:clamav:clamav:0.96:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CB27B025-3957-4CBB-A985-0B757ECFFBAB"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=clamav-0.96.1" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blobdiff%3Bf=libclamav/pe_icons.c%3Bh=3f1bc5be69d0f9d84e576814d1a3cc6f40c4ff2c%3Bhp=39a714f05968f9e929576bf171dd0eb58bf06bef%3Bhb=7f0e3bbf77382d9782e0189bf80f5f59a95779b3%3Bhpb=f0eb394501ec21b9fe67f36cbf5db788711d4236" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" ,
"source" : "secalert@redhat.com"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/39895" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:110" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2010/05/21/7" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.securityfocus.com/bid/40318" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2010/1214" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/58825" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2031" ,
"source" : "secalert@redhat.com"
}
]
}