Lucene search

K
gentooGentoo FoundationGLSA-200509-13
HistorySep 19, 2005 - 12:00 a.m.

Clam AntiVirus: Multiple vulnerabilities

2005-09-1900:00:00
Gentoo Foundation
security.gentoo.org
17

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.331 Low

EPSS

Percentile

97.0%

Background

Clam AntiVirus is a GPL anti-virus toolkit, designed for integration with mail servers to perform attachment scanning. Clam AntiVirus also provides a command line scanner and a tool for fetching updates of the virus database.

Description

Clam AntiVirus is vulnerable to a buffer overflow in “libclamav/upx.c” when processing malformed UPX-packed executables. It can also be sent into an infinite loop in “libclamav/fsg.c” when processing specially-crafted FSG-packed executables.

Impact

By sending a specially-crafted file an attacker could execute arbitrary code with the permissions of the user running Clam AntiVirus, or cause a Denial of Service.

Workaround

There is no known workaround at this time.

Resolution

All Clam AntiVirus users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.87"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-antivirus/clamav< 0.87UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.331 Low

EPSS

Percentile

97.0%