Search for vulnerabilities
Vulnerability details: VCID-kgyp-a4y6-aaah
Vulnerability ID VCID-kgyp-a4y6-aaah
Aliases CVE-2007-4560
Summary clamav-milter in ClamAV before 0.91.2, when run in black hole mode, allows remote attackers to execute arbitrary commands via shell metacharacters that are used in a certain popen call, involving the "recipient field of sendmail."
Status Published
Exploitability 2.0
Weighted Severity 6.8
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.91095 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.96222 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.96222 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.96222 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.96222 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.96549 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.96549 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.96549 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.96549 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.96549 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.96549 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.96549 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
epss 0.96549 https://api.first.org/data/v1/epss?cve=CVE-2007-4560
cvssv2 7.6 https://nvd.nist.gov/vuln/detail/CVE-2007-4560
Reference id Reference type URL
http://docs.info.apple.com/article.html?artnum=307562
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
https://api.first.org/data/v1/epss?cve=CVE-2007-4560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4560
http://secunia.com/advisories/26654
http://secunia.com/advisories/26674
http://secunia.com/advisories/26683
http://secunia.com/advisories/26751
http://secunia.com/advisories/26822
http://secunia.com/advisories/26916
http://secunia.com/advisories/29420
http://security.gentoo.org/glsa/glsa-200709-14.xml
http://securityreason.com/securityalert/3063
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00104.html
http://www.debian.org/security/2007/dsa-1366
http://www.mandriva.com/security/advisories?name=MDKSA-2007:172
http://www.novell.com/linux/security/advisories/2007_18_sr.html
http://www.nruns.com/security_advisory_clamav_remote_code_exection.php
http://www.securityfocus.com/archive/1/477723/100/0/threaded
http://www.securityfocus.com/bid/25439
http://www.securitytracker.com/id?1018610
http://www.trustix.org/errata/2007/0026/
http://www.vupen.com/english/advisories/2008/0924/references
cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*
CVE-2007-4560 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/4761.pl
CVE-2007-4560 https://nvd.nist.gov/vuln/detail/CVE-2007-4560
CVE-2007-4560;OSVDB-36909 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16924.rb
CVE-2007-4560;OSVDB-36909 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9913.rb
GLSA-200709-14 https://security.gentoo.org/glsa/200709-14
Data source Exploit-DB
Date added Dec. 20, 2007
Description Sendmail with clamav-milter < 0.91.2 - Remote Command Execution
Ransomware campaign use Known
Source publication date Dec. 21, 2007
Exploit type remote
Platform multiple
Source update date Dec. 4, 2016
Data source Metasploit
Description This module exploits a flaw in the Clam AntiVirus suite 'clamav-milter' (Sendmail mail filter). Versions prior to v0.92.2 are vulnerable. When implemented with black hole mode enabled, it is possible to execute commands remotely due to an insecure popen call.
Note
{}
Ransomware campaign use Unknown
Source publication date Aug. 24, 2007
Platform Unix
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/unix/smtp/clamav_milter_blackhole.rb
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2007-4560
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.99626
EPSS Score 0.91095
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.