Show plain JSON{"id": "CVE-2007-3122", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2007-06-07T21:30:00.000", "references": [{"url": "http://kolab.org/security/kolab-vendor-notice-15.txt", "source": "cve@mitre.org"}, {"url": "http://lurker.clamav.net/message/20070530.224918.5c64abc4.en.html", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://osvdb.org/45392", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/25523", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/25525", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/25688", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/25796", "source": "cve@mitre.org"}, {"url": "http://security.gentoo.org/glsa/glsa-200706-05.xml", "source": "cve@mitre.org"}, {"url": "http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog", "source": "cve@mitre.org"}, {"url": "http://www.debian.org/security/2007/dsa-1320", "source": "cve@mitre.org"}, {"url": "http://www.novell.com/linux/security/advisories/2007_33_clamav.html", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34823", "source": "cve@mitre.org"}, {"url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=511", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://kolab.org/security/kolab-vendor-notice-15.txt", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lurker.clamav.net/message/20070530.224918.5c64abc4.en.html", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/45392", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/25523", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/25525", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/25688", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/25796", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://security.gentoo.org/glsa/glsa-200706-05.xml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2007/dsa-1320", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.novell.com/linux/security/advisories/2007_33_clamav.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34823", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=511", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "The parsing engine in ClamAV before 0.90.3 and 0.91 before 0.91rc1 allows remote attackers to bypass scanning via a RAR file with a header flag value of 10, which can be processed by WinRAR."}, {"lang": "es", "value": "El motor de an\u00e1lisis sint\u00e1ctico del ClamAV anterior al 0.90.3 y el 0.91 anterior al 0.91rc1, permite a atacantes remotos evitar el escaneo mediante un fichero RAR con una bandera de la cabecera con valor 10, lo que puede ser procesado por el WinRAR."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:clam_anti-virus:clamav:0.90:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "142588F8-15C3-4288-BE7C-B2F7447BD60F"}, {"criteria": "cpe:2.3:a:clam_anti-virus:clamav:0.90.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC18418B-7477-436C-A24A-081701968DEF"}, {"criteria": "cpe:2.3:a:clam_anti-virus:clamav:0.90.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A85C689-95E0-41F7-83D9-5A8B0AB42390"}, {"criteria": "cpe:2.3:a:clam_anti-virus:clamav:0.90_rc1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B116E9A-0646-4AD5-A531-C35124AB02DC"}, {"criteria": "cpe:2.3:a:clam_anti-virus:clamav:0.90_rc2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F3C25BA-72EF-4588-A90A-B323A3407FAD"}, {"criteria": "cpe:2.3:a:clam_anti-virus:clamav:0.90_rc3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01FDAEBC-0B2E-4F60-8B59-13A93B1AF206"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}