CVE-2008-6662

AVG Anti-Virus for Linux 7.5.51, and possibly earlier, allows remote attackers to cause a denial of service (segmentation fault) or possibly execute arbitrary code via a malformed UPX compressed file, which triggers memory corruption.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:a:avg:avg_anti-virus:7.5.51:*:*:*:*:*:*:*

History

21 Nov 2024, 00:57

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=122893196715523&w=2 - Mailing List, Third Party Advisory () http://marc.info/?l=bugtraq&m=122893196715523&w=2 - Mailing List, Third Party Advisory
References () http://www.ivizsecurity.com/security-advisory-iviz-sr-08014.html - Third Party Advisory () http://www.ivizsecurity.com/security-advisory-iviz-sr-08014.html - Third Party Advisory
References () http://www.osvdb.org/51962 - Broken Link () http://www.osvdb.org/51962 - Broken Link
References () http://www.securityfocus.com/bid/32749 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/32749 - Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2008/3461 - Broken Link () http://www.vupen.com/english/advisories/2008/3461 - Broken Link
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/47254 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/47254 - Third Party Advisory, VDB Entry

17 May 2024, 17:38

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=122893196715523&w=2 - () http://marc.info/?l=bugtraq&m=122893196715523&w=2 - Mailing List, Third Party Advisory
References () http://www.ivizsecurity.com/security-advisory-iviz-sr-08014.html - () http://www.ivizsecurity.com/security-advisory-iviz-sr-08014.html - Third Party Advisory
References () http://www.osvdb.org/51962 - () http://www.osvdb.org/51962 - Broken Link
References () http://www.securityfocus.com/bid/32749 - () http://www.securityfocus.com/bid/32749 - Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2008/3461 - Vendor Advisory () http://www.vupen.com/english/advisories/2008/3461 - Broken Link
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/47254 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/47254 - Third Party Advisory, VDB Entry
First Time Linux linux Kernel
CPE cpe:2.3:o:linux:linux:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Information

Published : 2009-04-07 23:30

Updated : 2024-11-21 00:57


NVD link : CVE-2008-6662

Mitre link : CVE-2008-6662

CVE.ORG link : CVE-2008-6662


JSON object : View

Products Affected

avg

  • avg_anti-virus

linux

  • linux_kernel
CWE
CWE-20

Improper Input Validation