U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2007-0897

Change History

Modified Analysis by NIST 2/08/2024 9:48:50 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST CWE-772
Removed CWE
NIST NVD-CWE-Other

								
						
Changed CPE Configuration
OR
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.15
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.20
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.21
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.22
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.23
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.24
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.51
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.52
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.53
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.54
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.60
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.60p
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.65
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.67
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.68
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.68.1
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.70
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.71
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.72
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.73
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.74
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.75
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.75.1
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.80
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.80_rc1
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.80_rc2
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.80_rc3
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.80_rc4
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.81
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.81_rc1
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.82
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.83
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.84
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.84_rc1
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.84_rc2
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.85
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.85.1
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.86
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.86.1
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.86.2
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.86_rc1
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.87
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.87.1
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.88
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.88.1
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.88.3
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.88.4
     *cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* versions up to (including) 0.88.6
OR
     *cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:* versions up to (excluding) 0.90
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* versions up to (excluding) 10.4.11
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
Changed Reference Type
http://docs.info.apple.com/article.html?artnum=307562 No Types Assigned
http://docs.info.apple.com/article.html?artnum=307562 Broken Link
Changed Reference Type
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=475 Vendor Advisory
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=475 Broken Link, Vendor Advisory
Changed Reference Type
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html No Types Assigned
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html Mailing List
Changed Reference Type
http://lists.suse.com/archive/suse-security-announce/2007-Feb/0004.html No Types Assigned
http://lists.suse.com/archive/suse-security-announce/2007-Feb/0004.html Broken Link
Changed Reference Type
http://osvdb.org/32283 No Types Assigned
http://osvdb.org/32283 Broken Link
Changed Reference Type
http://secunia.com/advisories/24183 Vendor Advisory
http://secunia.com/advisories/24183 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/24187 Patch, Vendor Advisory
http://secunia.com/advisories/24187 Broken Link, Patch, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/24192 Vendor Advisory
http://secunia.com/advisories/24192 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/24319 Vendor Advisory
http://secunia.com/advisories/24319 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/24332 Vendor Advisory
http://secunia.com/advisories/24332 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/24425 Vendor Advisory
http://secunia.com/advisories/24425 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/29420 No Types Assigned
http://secunia.com/advisories/29420 Broken Link
Changed Reference Type
http://security.gentoo.org/glsa/glsa-200703-03.xml No Types Assigned
http://security.gentoo.org/glsa/glsa-200703-03.xml Third Party Advisory
Changed Reference Type
http://www.debian.org/security/2007/dsa-1263 No Types Assigned
http://www.debian.org/security/2007/dsa-1263 Mailing List
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDKSA-2007:043 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDKSA-2007:043 Broken Link
Changed Reference Type
http://www.securityfocus.com/bid/22580 Patch
http://www.securityfocus.com/bid/22580 Broken Link, Patch, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id?1017659 No Types Assigned
http://www.securitytracker.com/id?1017659 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.vupen.com/english/advisories/2007/0623 No Types Assigned
http://www.vupen.com/english/advisories/2007/0623 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2008/0924/references No Types Assigned
http://www.vupen.com/english/advisories/2008/0924/references Broken Link
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/32531 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/32531 Third Party Advisory, VDB Entry
Changed Evaluator Solution
This vulnerability is addressed in the following product release:
Clam AntiVirus, ClamAV, 0.90 Stable
This vulnerability is addressed in the following product release:
Clam AntiVirus, ClamAV, 0.90 Stable