Lucene search

K
amazonAmazonALAS-2018-976
HistoryMar 21, 2018 - 10:24 p.m.

Medium: clamav

2018-03-2122:24:00
alas.aws.amazon.com
17

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.024 Low

EPSS

Percentile

89.8%

Issue Overview:

Heap-based buffer overflow in mspack/lzxd.c
mspack/lzxd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted CHM file. (CVE-2017-6419)

Out-of-bounds access in the PDF parser (CVE-2018-0202)

A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the “DestPos” variable, which allows the attacker to write out of bounds when setting Mem[DestPos]. (CVE-2012-6706)

ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains… This attack appear to be exploitable via The victim must scan a crafted XAR file. (CVE-2018-1000085)

Stack-based buffer over-read in cabd_read_string function
The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2 and other products, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted CAB file. (CVE-2017-11423)

Affected Packages:

clamav

Issue Correction:
Run yum update clamav to update your system.

New Packages:

i686:  
    clamav-0.99.4-1.29.amzn1.i686  
    clamd-0.99.4-1.29.amzn1.i686  
    clamav-update-0.99.4-1.29.amzn1.i686  
    clamav-db-0.99.4-1.29.amzn1.i686  
    clamav-milter-0.99.4-1.29.amzn1.i686  
    clamav-debuginfo-0.99.4-1.29.amzn1.i686  
    clamav-lib-0.99.4-1.29.amzn1.i686  
    clamav-server-0.99.4-1.29.amzn1.i686  
    clamav-devel-0.99.4-1.29.amzn1.i686  
  
noarch:  
    clamav-milter-sysvinit-0.99.4-1.29.amzn1.noarch  
    clamav-server-sysvinit-0.99.4-1.29.amzn1.noarch  
    clamav-filesystem-0.99.4-1.29.amzn1.noarch  
    clamav-data-empty-0.99.4-1.29.amzn1.noarch  
    clamav-scanner-sysvinit-0.99.4-1.29.amzn1.noarch  
    clamav-scanner-0.99.4-1.29.amzn1.noarch  
    clamav-data-0.99.4-1.29.amzn1.noarch  
  
src:  
    clamav-0.99.4-1.29.amzn1.src  
  
x86_64:  
    clamav-devel-0.99.4-1.29.amzn1.x86_64  
    clamav-update-0.99.4-1.29.amzn1.x86_64  
    clamav-server-0.99.4-1.29.amzn1.x86_64  
    clamav-debuginfo-0.99.4-1.29.amzn1.x86_64  
    clamav-db-0.99.4-1.29.amzn1.x86_64  
    clamd-0.99.4-1.29.amzn1.x86_64  
    clamav-0.99.4-1.29.amzn1.x86_64  
    clamav-milter-0.99.4-1.29.amzn1.x86_64  
    clamav-lib-0.99.4-1.29.amzn1.x86_64  

Additional References

Red Hat: CVE-2012-6706, CVE-2017-11423, CVE-2017-6419, CVE-2018-0202, CVE-2018-1000085

Mitre: CVE-2012-6706, CVE-2017-11423, CVE-2017-6419, CVE-2018-0202, CVE-2018-1000085

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.024 Low

EPSS

Percentile

89.8%