GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Aug 08, 2006 2:26 pm Post subject: [ GLSA 200608-13 ] ClamAV: Heap buffer overflow |
|
|
Gentoo Linux Security Advisory
Title: ClamAV: Heap buffer overflow (GLSA 200608-13)
Severity: high
Exploitable: remote
Date: August 08, 2006
Bug(s): #143093
ID: 200608-13
Synopsis
ClamAV is vulnerable to a heap-based buffer overflow resulting in a Denial
of Service and potentially remote execution of arbitrary code.
Background
ClamAV is a GPL virus scanner.
Affected Packages
Package: app-antivirus/clamav
Vulnerable: < 0.88.4
Unaffected: >= 0.88.4
Architectures: All supported architectures
Description
Damian Put has discovered a boundary error in the pefromupx() function
used by the UPX extraction module, which unpacks PE Windows executable
files. Both the "clamscan" command-line utility and the "clamd" daemon
are affected.
Impact
By sending a malicious attachment to a mail server running ClamAV, a
remote attacker can cause a Denial of Service and potentially the
execution of arbitrary code with the permissions of the user running
ClamAV.
Workaround
There is no known workaround at this time.
Resolution
All ClamAV users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88.4" |
References
ClamAV security advisory
CVE-2006-4018
Last edited by GLSA on Sat May 17, 2014 4:23 am; edited 3 times in total |
|