Lucene search

K
freebsdFreeBSDD8E1AADD-EE68-11D9-8310-0001020EED82
HistoryJun 29, 2005 - 12:00 a.m.

clamav -- cabinet file handling DoS vulnerability

2005-06-2900:00:00
vuxml.freebsd.org
12

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

53.6%

An iDEFENSE Security Advisory reports:

Remote exploitation of an input validation error in Clam
AntiVirus ClamAV allows attackers to cause a denial of
service condition.
The vulnerability specifically exists due to insufficient
validation on cabinet file header data. The
ENSURE_BITS() macro fails to check for zero
length reads, allowing a carefully constructed cabinet
file to cause an infinite loop.
ClamAV is used in a number of mail gateway
products. Successful exploitation requires an attacker to
send a specially constructed CAB file through a mail
gateway or personal anti-virus client utilizing the ClamAV
scanning engine. The infinate loop will cause the ClamAV
software to use all available processor resources,
resulting in a denial of service or severe degradation to
system performance. Remote exploitation can be achieved by
sending a malicious file in an e-mail message or during an
HTTP session.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchclamav< 0.86UNKNOWN
FreeBSDanynoarchclamav-devel< 20050620UNKNOWN

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

53.6%

Related for D8E1AADD-EE68-11D9-8310-0001020EED82