CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
90.1%
Package : clamav
Version : 0.99.2+dfsg-0+deb7u4
CVE ID : CVE-2017-12374 CVE-2017-12375 CVE-2017-12376
CVE-2017-12377 CVE-2017-12378 CVE-2017-12379
CVE-2017-12380
Debian Bug : 888484 824196
Multiple vulnerabilities have been discovered in clamav, the ClamAV
AntiVirus toolkit for Unix. Effects range from denial of service to
potential arbitrary code execution. Additionally, this version fixes
a longstanding issue that has recently resurfaced whereby a malformed
virus signature database can cause an application crash and denial of
service.
CVE-2017-12374
ClamAV has a use-after-free condition arising from a lack of input
validation. A remote attacker could exploit this vulnerability with
a crafted email message to cause a denial of service.
CVE-2017-12375
ClamAV has a buffer overflow vulnerability arising from a lack of
input validation. An unauthenticated remote attacker could send a
crafted email message to the affected device, triggering a buffer
overflow and potentially a denial of service when the malicious
message is scanned.
CVE-2017-12376
ClamAV has a buffer overflow vulnerability arising from improper
input validation when handling Portable Document Format (PDF) files.
An unauthenticated remote attacker could send a crafted PDF file to
the affected device, triggering a buffer overflow and potentially a
denial of service or arbitrary code execution when the malicious
file is scanned.
CVE-2017-12377
ClamAV has a heap overflow vulnerability arising from improper input
validation when handling mew packets. An attacker could exploit this
by sending a crafted message to the affected device, triggering a
denial of service or possible arbitrary code execution when the
malicious file is scanned.
CVE-2017-12378
ClamAV has a buffer overread vulnerability arising from improper
input validation when handling tape archive (TAR) files. An
unauthenticated remote attacker could send a crafted TAR file to
the affected device, triggering a buffer overread and potentially a
denial of service when the malicious file is scanned.
CVE-2017-12379
ClamAV has a buffer overflow vulnerability arising from improper
input validation in the message parsing function. An unauthenticated
remote attacker could send a crafted email message to the affected
device, triggering a buffer overflow and potentially a denial of
service or arbitrary code execution when the malicious message is
scanned.
CVE-2017-12380
ClamAV has a NULL dereference vulnerability arising from improper
input validation in the message parsing function. An unauthenticated
remote attacker could send a crafted email message to the affected
device, triggering a NULL pointer dereference, which may result in a
denial of service.
Debian Bug #824196
A malformed virus signature database could cause an application
crash and denial of service.
For Debian 7 "Wheezy", these problems have been fixed in version
0.99.2+dfsg-0+deb7u4.
We recommend that you upgrade your clamav packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | i386 | clamav-daemon | < 0.99.2+dfsg-0+deb7u4 | clamav-daemon_0.99.2+dfsg-0+deb7u4_i386.deb |
Debian | 8 | mips | clamav-daemon | < 0.99.2+dfsg-0+deb8u3 | clamav-daemon_0.99.2+dfsg-0+deb8u3_mips.deb |
Debian | 7 | amd64 | clamav-freshclam | < 0.99.2+dfsg-0+deb7u4 | clamav-freshclam_0.99.2+dfsg-0+deb7u4_amd64.deb |
Debian | 8 | arm64 | clamav | < 0.99.2+dfsg-0+deb8u3 | clamav_0.99.2+dfsg-0+deb8u3_arm64.deb |
Debian | 8 | i386 | clamav-dbg | < 0.99.2+dfsg-0+deb8u3 | clamav-dbg_0.99.2+dfsg-0+deb8u3_i386.deb |
Debian | 9 | mipsel | clamdscan | < 0.99.2+dfsg-6+deb9u1 | clamdscan_0.99.2+dfsg-6+deb9u1_mipsel.deb |
Debian | 8 | i386 | clamav-daemon | < 0.99.2+dfsg-0+deb8u3 | clamav-daemon_0.99.2+dfsg-0+deb8u3_i386.deb |
Debian | 9 | s390x | clamav-freshclam | < 0.99.2+dfsg-6+deb9u1 | clamav-freshclam_0.99.2+dfsg-6+deb9u1_s390x.deb |
Debian | 8 | armhf | clamdscan | < 0.99.2+dfsg-0+deb8u3 | clamdscan_0.99.2+dfsg-0+deb8u3_armhf.deb |
Debian | 9 | all | clamav-docs | < 0.99.2+dfsg-6+deb9u1 | clamav-docs_0.99.2+dfsg-6+deb9u1_all.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
90.1%