GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Fri Jan 13, 2006 7:26 am Post subject: [ GLSA 200601-07 ] ClamAV: Remote execution of arbitrary cod |
|
|
Gentoo Linux Security Advisory
Title: ClamAV: Remote execution of arbitrary code (GLSA 200601-07)
Severity: high
Exploitable: remote
Date: January 13, 2006
Bug(s): #118459
ID: 200601-07
Synopsis
ClamAV is vulnerable to a buffer overflow which may lead to remote
execution of arbitrary code.
Background
ClamAV is a GPL virus scanner.
Affected Packages
Package: app-antivirus/clamav
Vulnerable: < 0.88
Unaffected: >= 0.88
Architectures: All supported architectures
Description
Zero Day Initiative (ZDI) reported a heap buffer overflow
vulnerability. The vulnerability is due to an incorrect boundary check
of the user-supplied data prior to copying it to an insufficiently
sized memory buffer. The flaw occurs when the application attempts to
handle compressed UPX files.
Impact
For example by sending a maliciously crafted UPX file into a mail
server that is integrated with ClamAV, a remote attacker's supplied
code could be executed with escalated privileges.
Workaround
There is no known workaround at this time.
Resolution
All ClamAV users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88" |
References
CVE-2006-0162
Last edited by GLSA on Wed May 04, 2011 4:21 am; edited 3 times in total |
|