cpe:/a:sophos:anti-virus:4.04 cpe:/a:sophos:anti-virus:4.05 cpe:/a:sophos:anti-virus:4.5.3 cpe:/a:sophos:anti-virus:4.5.4 cpe:/a:sophos:anti-virus:4.5.11 cpe:/a:sophos:anti-virus:4.5.12 cpe:/a:sophos:anti-virus:4.7.1 cpe:/a:sophos:anti-virus:4.7.2 cpe:/a:sophos:anti-virus:5.0.1 cpe:/a:sophos:anti-virus:5.0.2 cpe:/a:sophos:anti-virus:5.0.4 cpe:/a:sophos:anti-virus:5.1 cpe:/a:sophos:anti-virus:5.2 cpe:/a:sophos:anti-virus:5.2.1 cpe:/a:sophos:anti-virus:6.0.4 cpe:/a:sophos:endpoint_security:6.04 CVE-2006-5646 2006-11-01T10:07:00.000-05:00 2011-03-07T00:00:00.000-05:00 5.0 NETWORK LOW NONE NONE NONE PARTIAL http://nvd.nist.gov 2006-11-01T16:51:00.000-05:00 SECTRACK 1017132 IDEFENSE 20061208 Sophos Antivirus CHM File Heap Overflow Vulnerability BID 20816 SECUNIA 22591 VUPEN ADV-2006-4239 CONFIRM http://www.sophos.com/support/knowledgebase/article/7609.html Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0.