CVE-2007-2650

N/A Unknown
Published: May 14, 2007 Modified: April 23, 2026
View on NVD

Description

The OLE2 parser in Clam AntiVirus (ClamAV) allows remote attackers to cause a denial of service (resource consumption) via an OLE2 file with (1) a large property size or (2) a loop in the FAT file block chain that triggers an infinite loop, as demonstrated via a crafted DOC file.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/25244
Source: cve@mitre.org
Patch Third Party Advisory
http://secunia.com/advisories/25523
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/25525
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/25553
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/25558
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/25688
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/25796
Source: cve@mitre.org
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200706-05.xml
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2007/dsa-1320
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/24316
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.trustix.org/errata/2007/0020/
Source: cve@mitre.org
Broken Link
http://www.vupen.com/english/advisories/2007/1776
Source: cve@mitre.org
Permissions Required
http://article.gmane.org/gmane.comp.security.virus.clamav.devel/2853
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://kolab.org/security/kolab-vendor-notice-15.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lurker.clamav.net/message/20070418.111144.0df6c5d3.en.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/25244
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://secunia.com/advisories/25523
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/25525
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/25553
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/25558
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/25688
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/25796
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200706-05.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.debian.org/security/2007/dsa-1320
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:115
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.novell.com/linux/security/advisories/2007_33_clamav.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/24316
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.trustix.org/errata/2007/0020/
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2007/1776
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required

36 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
5.0%
90th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

debian clamav