Lucene search

K
freebsdFreeBSD271498A9-2CD4-11DA-A263-0001020EED82
HistorySep 16, 2005 - 12:00 a.m.

clamav -- arbitrary code execution and DoS vulnerabilities

2005-09-1600:00:00
vuxml.freebsd.org
13

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.331 Low

EPSS

Percentile

97.0%

Gentoo Linux Security Advisory reports:

Clam AntiVirus is vulnerable to a buffer overflow in
“libclamav/upx.c” when processing malformed UPX-packed
executables. It can also be sent into an infinite loop in
“libclamav/fsg.c” when processing specially-crafted
FSG-packed executables.
By sending a specially-crafted file an attacker could
execute arbitrary code with the permissions of the user
running Clam AntiVirus, or cause a Denial of Service.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchclamav< 0.87UNKNOWN
FreeBSDanynoarchclamav-devel< 20050917UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.331 Low

EPSS

Percentile

97.0%