CVE-2007-6336
Description
Off-by-one error in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MS-ZIP compressed CAB file.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Off-by-one error in ClamAV before 0.92 allows remote code execution via a crafted MS-ZIP compressed CAB file.
Vulnerability
An off-by-one error exists in ClamAV versions prior to 0.92 when decompressing MS-ZIP compressed CAB files. This flaw resides in the CAB decompression code and can be triggered when scanning a specially crafted file. All versions before 0.92 are affected [1].
Exploitation
A remote attacker can craft a malicious CAB file using MS-ZIP compression. If a user or automated system (e.g., a mail gateway) scans this file with a vulnerable ClamAV version, the off-by-one error is triggered. No authentication or special privileges are required; the attack relies on the target processing the file [1].
Impact
Successful exploitation allows arbitrary code execution with the privileges of the user running ClamAV. This could be a system user or the clamav user if clamd is compromised, leading to full compromise of the scanning process and potential system access [1].
Mitigation
Upgrade to ClamAV 0.92 or later. Gentoo users can install >=app-antivirus/clamav-0.91.2-r1 as a patched version. No known workaround exists for unpatched installations [1].
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
19- www.securityfocus.com/bid/26946nvdPatch
- secunia.com/advisories/28153nvdVendor Advisory
- secunia.com/advisories/28176nvdVendor Advisory
- secunia.com/advisories/28278nvdVendor Advisory
- secunia.com/advisories/28412nvdVendor Advisory
- secunia.com/advisories/28421nvdVendor Advisory
- secunia.com/advisories/28587nvdVendor Advisory
- secunia.com/advisories/29420nvdVendor Advisory
- www.vupen.com/english/advisories/2008/0924/referencesnvdVendor Advisory
- docs.info.apple.com/article.htmlnvd
- lists.apple.com/archives/security-announce/2008/Mar/msg00001.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.htmlnvd
- security.gentoo.org/glsa/glsa-200712-20.xmlnvd
- securitytracker.com/idnvd
- www.debian.org/security/2007/dsa-1435nvd
- www.mandriva.com/security/advisoriesnvd
- exchange.xforce.ibmcloud.com/vulnerabilities/39169nvd
- www.redhat.com/archives/fedora-package-announce/2008-January/msg00644.htmlnvd
- www.redhat.com/archives/fedora-package-announce/2008-January/msg00740.htmlnvd
News mentions
0No linked articles in our index yet.