Lucene search

K
gentooGentoo FoundationGLSA-200608-13
HistoryAug 08, 2006 - 12:00 a.m.

ClamAV: Heap buffer overflow

2006-08-0800:00:00
Gentoo Foundation
security.gentoo.org
9

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.875 High

EPSS

Percentile

98.7%

Background

ClamAV is a GPL virus scanner.

Description

Damian Put has discovered a boundary error in the pefromupx() function used by the UPX extraction module, which unpacks PE Windows executable files. Both the “clamscan” command-line utility and the “clamd” daemon are affected.

Impact

By sending a malicious attachment to a mail server running ClamAV, a remote attacker can cause a Denial of Service and potentially the execution of arbitrary code with the permissions of the user running ClamAV.

Workaround

There is no known workaround at this time.

Resolution

All ClamAV users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88.4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-antivirus/clamav< 0.88.4UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.875 High

EPSS

Percentile

98.7%