FreeBSD : clamav -- Multiple Vulnerabilities (589d8053-0b03-11dd-b4ef-00e07dc4ec84)

critical Nessus Plugin ID 31983

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Secunia reports :

Some vulnerabilities have been reported in ClamAV, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system.

1) A boundary error exists within the 'cli_scanpe()' function in libclamav/pe.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted 'Upack' executable.

Successful exploitation allows execution of arbitrary code.

2) A boundary error within the processing of PeSpin packed executables in libclamav/spin.c can be exploited to cause a heap-based buffer overflow.

Successful exploitation may allow execution of arbitrary code.

3) An unspecified error in the processing of ARJ files can be exploited to hang ClamAV.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?ff663c2b

Plugin Details

Severity: Critical

ID: 31983

File Name: freebsd_pkg_589d80530b0311ddb4ef00e07dc4ec84.nasl

Version: 1.16

Type: local

Published: 4/18/2008

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:clamav, p-cpe:/a:freebsd:freebsd:clamav-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 4/15/2008

Vulnerability Publication Date: 4/15/2008

Reference Information

CVE: CVE-2008-1100, CVE-2008-1387

CWE: 119

Secunia: 29000