Search for vulnerabilities
Vulnerability details: VCID-tmuz-6f78-aaar
Vulnerability ID VCID-tmuz-6f78-aaar
Aliases CVE-2007-6335
Summary Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
epss 0.26228 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.26228 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.26228 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.26228 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.26607 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.26607 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.26607 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.26607 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.26607 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.26607 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.26607 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.30652 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.30652 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.30652 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.39002 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
epss 0.54281 https://api.first.org/data/v1/epss?cve=CVE-2007-6335
rhbs urgent https://bugzilla.redhat.com/show_bug.cgi?id=426210
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2007-6335
Reference id Reference type URL
http://docs.info.apple.com/article.html?artnum=307562
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=634
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6335.json
https://api.first.org/data/v1/epss?cve=CVE-2007-6335
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6335
http://secunia.com/advisories/28117
http://secunia.com/advisories/28153
http://secunia.com/advisories/28176
http://secunia.com/advisories/28278
http://secunia.com/advisories/28412
http://secunia.com/advisories/28421
http://secunia.com/advisories/28587
http://secunia.com/advisories/29420
http://security.gentoo.org/glsa/glsa-200712-20.xml
https://exchange.xforce.ibmcloud.com/vulnerabilities/39119
https://www.exploit-db.com/exploits/4862
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00644.html
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00740.html
http://www.debian.org/security/2007/dsa-1435
http://www.mandriva.com/security/advisories?name=MDVSA-2008:003
http://www.securityfocus.com/bid/26927
http://www.securitytracker.com/id?1019112
http://www.vupen.com/english/advisories/2007/4253
http://www.vupen.com/english/advisories/2008/0924/references
426210 https://bugzilla.redhat.com/show_bug.cgi?id=426210
cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*
CVE-2007-6335 https://nvd.nist.gov/vuln/detail/CVE-2007-6335
GLSA-200712-20 https://security.gentoo.org/glsa/200712-20
Data source Exploit-DB
Date added Jan. 6, 2008
Description ClamAV 0.91.2 - libclamav MEW PE Buffer Overflow
Ransomware campaign use Known
Source publication date Jan. 7, 2008
Exploit type remote
Platform linux
Source update date Nov. 8, 2016
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2007-6335
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.96896
EPSS Score 0.26228
Published At Dec. 3, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.