Lucene search

K
gentooGentoo FoundationGLSA-200507-25
HistoryJul 26, 2005 - 12:00 a.m.

Clam AntiVirus: Integer overflows

2005-07-2600:00:00
Gentoo Foundation
security.gentoo.org
6

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.327 Low

EPSS

Percentile

97.1%

Background

Clam AntiVirus is a GPL anti-virus toolkit, designed for integration with mail servers to perform attachment scanning. Clam AntiVirus also provides a command line scanner and a tool for fetching updates of the virus database.

Description

Neel Mehta and Alex Wheeler discovered that Clam AntiVirus is vulnerable to integer overflows when handling the TNEF, CHM and FSG file formats.

Impact

By sending a specially-crafted file an attacker could execute arbitrary code with the permissions of the user running Clam AntiVirus.

Workaround

There is no known workaround at this time.

Resolution

All Clam AntiVirus users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.86.2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-antivirus/clamav< 0.86.2UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.327 Low

EPSS

Percentile

97.1%