Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2007-4560

EPSS 87.09% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2007-4560

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
clamav-milter in ClamAV before 0.91.2, when run in black hole mode, allows remote attackers to execute arbitrary commands via shell metacharacters that are used in a certain popen call, involving the "recipient field of sendmail."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ClamAV Popen Function 远程代码执行漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ClamAV版本之前的版本0.91.2版本的clamav-milter,当在black hole mode中运行时,远程攻击者可以借助在某popen调用程序中的外壳元字符,且这些元字符涉及sendmail字段的获取",以执行任意指令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2007-4560

#POC DescriptionSource LinkShenlong Link
1Exploit for CVE-2007-4560 (ClamAV Milter Sendmail 0.91.2 Remote Code Execution)https://github.com/0x1sac/ClamAV-Milter-Sendmail-0.91.2-Remote-Code-ExecutionPOC Details
2Python RCE exploit for Sendmail with ClamAV-Milter <0.91.2 (CVE-2007-4560). Remote root command injection via SMTP RCPT TO headers.https://github.com/strikoder/sendmail-clamav-exploit-CVE-2007-4560POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2007-4560

登录查看更多情报信息。

Same Patch Batch · n/a · 2007-08-28 · 23 CVEs total

CVE-2007-4557Novell GroupWise WebAccess 跨站脚本攻击漏洞
CVE-2007-4580Trustware BufferZone 缓冲区溢出漏洞
CVE-2007-4578Sophos Antivirus UPX文件解析拒绝服务漏洞
CVE-2007-4577Sophos Antivirus BZIP文件解析拒绝服务漏洞
CVE-2007-3846Subversion for Windows Remote 目录遍历漏洞
CVE-2007-4566SIDVault Simple_Bind函数多个远程栈溢出漏洞
CVE-2007-4565Fetchmail无效警告消息本地拒绝服务漏洞
CVE-2007-4564Hitachi Cosminexus Application Server 多个授权访问漏洞
CVE-2007-4563Hitachi Cosminexus Application Server 多个授权访问漏洞
CVE-2007-4562Hitachi DABroker拒绝服务漏洞
CVE-2007-4561Real Networks Helix服务器RTSP命令远程堆溢出漏洞
CVE-2007-4549ALPass Import Site Information 缓冲区溢出漏洞
CVE-2007-4556XWork AltSyntax功能OGNL命令注入漏洞
CVE-2007-4521Asterisk畸形MIME体远程拒绝服务漏洞
CVE-2006-7222Media Player Classic FLI文件处理远程缓冲区溢出漏洞
CVE-2007-4559Python tarfile 模块路径遍历漏洞
CVE-2007-4555Ipswitch WS_FTP 跨站脚本攻击漏洞
CVE-2007-4554TikiWiki tiki-remind_password.php文件跨站脚本漏洞
CVE-2007-4553Thomson ST SIP phone拒绝服务漏洞
CVE-2007-4552RETIRED: Arcadem Index.PHP SQL注入漏洞

Showing top 20 of 23 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2007-4560

No comments yet


Leave a comment