Joined: 12 May 2004
|Posted: Fri Jan 13, 2006 7:26 am Post subject: [ GLSA 200601-07 ] ClamAV: Remote execution of arbitrary cod
|Gentoo Linux Security Advisory
Title: ClamAV: Remote execution of arbitrary code (GLSA 200601-07)
Date: January 13, 2006
ClamAV is vulnerable to a buffer overflow which may lead to remote
execution of arbitrary code.
ClamAV is a GPL virus scanner.
Vulnerable: < 0.88
Unaffected: >= 0.88
Architectures: All supported architectures
Zero Day Initiative (ZDI) reported a heap buffer overflow
vulnerability. The vulnerability is due to an incorrect boundary check
of the user-supplied data prior to copying it to an insufficiently
sized memory buffer. The flaw occurs when the application attempts to
handle compressed UPX files.
For example by sending a maliciously crafted UPX file into a mail
server that is integrated with ClamAV, a remote attacker's supplied
code could be executed with escalated privileges.
There is no known workaround at this time.
All ClamAV users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88"
Last edited by GLSA on Wed May 04, 2011 4:21 am; edited 3 times in total