CVE-2006-1989

N/A Unknown
Published: May 01, 2006 Modified: April 16, 2026
View on NVD

Description

Buffer overflow in the get_database function in the HTTP client in Freshclam in ClamAV 0.80 to 0.88.1 might allow remote web servers to execute arbitrary code via long HTTP headers.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/19880
Source: cve@mitre.org
Exploit Patch Vendor Advisory
http://www.clamav.net/security/0.88.2.html
Source: cve@mitre.org
Exploit Vendor Advisory
http://www.kb.cert.org/vuls/id/599220
Source: cve@mitre.org
US Government Resource
http://www.osvdb.org/25120
Source: cve@mitre.org
http://www.securityfocus.com/bid/17754
Source: cve@mitre.org
Patch
http://kolab.org/security/kolab-vendor-notice-09.txt
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19874
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19880
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch Vendor Advisory
http://secunia.com/advisories/19912
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19963
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19964
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20117
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20159
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20877
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016392
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.clamav.net/security/0.88.2.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Vendor Advisory
http://www.debian.org/security/2006/dsa-1050
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200605-03.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/599220
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:080
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2006_05_05.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/25120
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/17754
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.trustix.org/errata/2006/0024
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/1586
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/2566
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/26182
Source: af854a3a-2127-422b-91ae-364da2661108

48 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
4.5%
89th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

clam_anti-virus