FreeBSD : clamav -- Freshclam HTTP Header Buffer Overflow Vulnerability (b088bf48-da3b-11da-93e0-00123ffe8333)

medium Nessus Plugin ID 21496

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Secunia reports :

A vulnerability has been reported in ClamAV, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system.

The vulnerability is caused due to a boundary error within the HTTP client in the Freshclam command line utility. This can be exploited to cause a stack-based buffer overflow when the HTTP headers received from a web server exceeds 8KB.

Successful exploitation requires that Freshclam is used to download virus signature updates from a malicious mirror web server e.g. via DNS poisoning.

Solution

Update the affected packages.

See Also

http://www.clamav.net/security/0.88.2.html

http://www.nessus.org/u?c1436092

Plugin Details

Severity: Medium

ID: 21496

File Name: freebsd_pkg_b088bf48da3b11da93e000123ffe8333.nasl

Version: 1.13

Type: local

Published: 5/13/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:clamav, p-cpe:/a:freebsd:freebsd:clamav-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 5/3/2006

Vulnerability Publication Date: 5/1/2006

Reference Information

CVE: CVE-2006-1989

Secunia: 19880