Clam AntiVirus Bugs Let Remote Users Deny Service and Execute Arbitrary Code
|
SecurityTracker Alert ID: 1024818 |
SecurityTracker URL: http://securitytracker.com/id/1024818
|
CVE Reference:
CVE-2010-4260, CVE-2010-4261, CVE-2010-4479
(Links to External Site)
|
Updated: Dec 8 2010
|
Original Entry Date: Dec 3 2010
|
Impact:
Denial of service via network, Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): prior to 0.96.5
|
Description:
A vulnerability was reported in Clam AntiVirus. A remote user can cause arbitrary code to be executed on the target system. A remote user can cause denial of service conditions.
A remote user can create a specially crafted file that, when loaded by the target application, will trigger an off-by-one memory error in 'libclamav/pe_icons.c' and potentially execute arbitrary code on the target system.
A remote user can create a specially crafted PDF file that, when loaded by the target application, will trigger an error in 'libclamav/pdf.c' and crash.
Arkadiusz Miskiewicz reported one of the PDF vulnerabilities.
|
Impact:
A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target system or cause the target application to crash.
|
Solution:
The vendor has issued a fix (0.96.5).
The vendor's advisory is available at:
http://git.clamav.net/gitweb?p=clamav-devel.git;f=ChangeLog;hb=clamav-0.96.5
|
Vendor URL: www.clamav.net/ (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Linux (Any), UNIX (Any)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|