clamav
Page content
- Vulnerable: 0.92.1-1
- Unaffected: 0.93-1kalgan1
Some vulnerabilities have been reported in ClamAV, which can be exploited by malicious people to bypass certain security restrictions, to cause a DoS (Denial of Service), or to compromise a vulnerable system.
- A boundary error exists within the “cli_scanpe()” function in libclamav/pe.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted “Upack” executable. Successful exploitation allows execution of arbitrary code.
- A boundary error within the processing of PeSpin packed executables in libclamav/spin.c can be exploited to cause a heap-based buffer overflow. Successful exploitation may allow execution of arbitrary code.
- An unspecified error in the processing of ARJ files can be exploited to hang ClamAV.
- A boundary error within the processing of WWPack packed PE files in libclamav/pe.c can be exploited to cause a heap corruption. Successful exploitation may allow execution of arbitrary code.
- An error in the processing of RAR files can be exploited to bypass the scanning mechanism via a RAR file containing an invalid version number.
- An error exists within the “rfc2231()” function in message.c. This can be exploited to trigger the return of strings that are not NULL terminated and cause a crash.
- An error in libclamunrar can be exploited to crash the application via specially crafted RAR files.
- Bug Tracker URL: http://bugs.frugalware.org/task/3014
CVEs:
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1100
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0314
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1387
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1833
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1835
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1836
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1837