Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.
http://docs.info.apple.com/article.html?artnum=307562
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=634
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html
http://secunia.com/advisories/28117
http://secunia.com/advisories/28153
http://secunia.com/advisories/28176
http://secunia.com/advisories/28278
http://secunia.com/advisories/28412
http://secunia.com/advisories/28421
http://secunia.com/advisories/28587
http://secunia.com/advisories/29420
http://security.gentoo.org/glsa/glsa-200712-20.xml
https://exchange.xforce.ibmcloud.com/vulnerabilities/39119
https://www.exploit-db.com/exploits/4862
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00644.html
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00740.html
http://www.debian.org/security/2007/dsa-1435
http://www.mandriva.com/security/advisories?name=MDVSA-2008:003
http://www.securitytracker.com/id?1019112
http://www.vupen.com/english/advisories/2007/4253
http://www.vupen.com/english/advisories/2008/0924/references
Published: 2007-12-20
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High