Lucene search

K
amazonAmazonALAS-2019-1146
HistoryJan 09, 2019 - 10:56 p.m.

Low: clamav

2019-01-0922:56:00
alas.aws.amazon.com
239

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.009 Low

EPSS

Percentile

82.7%

Issue Overview:

An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.(CVE-2018-14681)

An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.(CVE-2018-14682)

An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.(CVE-2018-14680)

A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the “unmew11()” function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.(CVE-2018-15378)

An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash).(CVE-2018-14679)

Affected Packages:

clamav

Issue Correction:
Run yum update clamav to update your system.

New Packages:

i686:  
    clamav-lib-0.100.2-2.35.amzn1.i686  
    clamav-milter-0.100.2-2.35.amzn1.i686  
    clamav-0.100.2-2.35.amzn1.i686  
    clamav-debuginfo-0.100.2-2.35.amzn1.i686  
    clamav-db-0.100.2-2.35.amzn1.i686  
    clamav-update-0.100.2-2.35.amzn1.i686  
    clamd-0.100.2-2.35.amzn1.i686  
    clamav-devel-0.100.2-2.35.amzn1.i686  
  
noarch:  
    clamav-filesystem-0.100.2-2.35.amzn1.noarch  
    clamav-data-0.100.2-2.35.amzn1.noarch  
  
src:  
    clamav-0.100.2-2.35.amzn1.src  
  
x86_64:  
    clamav-lib-0.100.2-2.35.amzn1.x86_64  
    clamav-milter-0.100.2-2.35.amzn1.x86_64  
    clamav-db-0.100.2-2.35.amzn1.x86_64  
    clamav-debuginfo-0.100.2-2.35.amzn1.x86_64  
    clamd-0.100.2-2.35.amzn1.x86_64  
    clamav-devel-0.100.2-2.35.amzn1.x86_64  
    clamav-update-0.100.2-2.35.amzn1.x86_64  
    clamav-0.100.2-2.35.amzn1.x86_64  

Additional References

Red Hat: CVE-2018-14679, CVE-2018-14680, CVE-2018-14681, CVE-2018-14682, CVE-2018-15378

Mitre: CVE-2018-14679, CVE-2018-14680, CVE-2018-14681, CVE-2018-14682, CVE-2018-15378

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.009 Low

EPSS

Percentile

82.7%