ClamAV < 0.95 Scan Evasion

medium Nessus Plugin ID 36075

Synopsis

The remote antivirus service is affected by multiple vulnerabilities.

Description

According to its version, the clamd antivirus daemon on the remote host is earlier than 0.95. Such versions are affected by multiple vulnerabilities :

- A failure to handle certain malformed 'RAR' archive files could make it possible for certain archive files to evade detection from the scan engine. (Bug 1467)

- A failure to handle certain malformed 'RAR' archive files could send the application into an infinite loop, which could make it possible to crash the scan engine.
(Bug 1462)

- A divide by zero issue when handling specially crafted 'PE' file could be used to crash the affected application. (Bug 1335)

Solution

Upgrade to ClamAV 0.95 or later.

See Also

http://www.nessus.org/u?4e1b5afc

https://seclists.org/bugtraq/2009/Apr/20

http://www.nessus.org/u?91209430

Plugin Details

Severity: Medium

ID: 36075

File Name: clamav_0_95.nasl

Version: 1.24

Type: remote

Family: Misc.

Published: 4/2/2009

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:clamav:clamav

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2008-6680, CVE-2009-1241, CVE-2009-1270

BID: 34344, 34357

CWE: 189, 20, 94