ClamAV < 0.97.8 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 6782

Synopsis

The remote host is running an anti-virus application that is affected by multiple vulnerabilities.

Description

Versions of ClamAV earlier than 0.97.8 are potentially affected by the following vulnerabilities :

- An overflow condition in 'libclamav/pdf.c' may be triggered as user-supplied input is not properly validated when handling a specially crafted encrypted PDF file. This may allow a context-dependent attacker to cause a heap-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code. (CVE-2013-2021)

- An overflow condition in 'libclamav/pe.c' may be triggered as user-supplied input is not properly validated when handling a specially crafted UPX-packed executable file. This may allow a context-dependent attacker to cause a heap-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code. (CVE-2013-2020)

Solution

Upgrade to ClamAV 0.97.8 or later.

See Also

http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html

https://bugzilla.clamav.net/show_bug.cgi?id=7053

https://bugzilla.clamav.net/show_bug.cgi?id=7054

https://bugzilla.clamav.net/show_bug.cgi?id=7055

Plugin Details

Severity: Medium

ID: 6782

Family: Web Clients

Published: 5/2/2013

Updated: 3/6/2019

Nessus ID: 66308

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:clamav

Patch Publication Date: 4/23/2013

Vulnerability Publication Date: 4/23/2013

Reference Information

CVE: CVE-2013-2020, CVE-2013-2021

BID: 59434, 60118