Lucene search

K
saintSAINT CorporationSAINT:04B532BA379845DF79BE2BAE7217EF75
HistorySep 06, 2007 - 12:00 a.m.

ClamAV milter popen command injection

2007-09-0600:00:00
SAINT Corporation
my.saintcorporation.com
22

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.965 High

EPSS

Percentile

99.6%

Added: 09/06/2007
CVE: CVE-2007-4560
BID: 25439
OSVDB: 36909

Background

ClamAV is an open-source anti-virus toolkit. clamav-milter is a derivative of ClamAV for e-mail servers running Sendmail.

Problem

An insecure call to the popen function in clamav-milter, when running in black hole mode, allows an attacker to inject shell commands into the recipient field.

Resolution

Upgrade to ClamAV 0.91.2 or higher.

References

<http://www.securityfocus.com/archive/1/477723&gt;

Limitations

Exploit works on ClamAV 0.91.1.

In order for the exploit to succeed, Sendmail must be configured to use clamav-milter, clamav-milter must be running in black hole mode, and the following utilities must be present on the target system: nc, nc6 (if using IPv6), mkfifo, sh.

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.965 High

EPSS

Percentile

99.6%