FreeBSD : clamav -- MS-Expand file handling DoS vulnerability (6d18fe19-ee67-11d9-8310-0001020eed82)

medium Nessus Plugin ID 18975

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

An iDEFENSE Security Advisory reports :

Remote exploitation of an input validation error in Clam AntiVirus ClamAV allows attackers to cause a denial of service condition.

The vulnerability specifically exists due to improper behavior during exceptional conditions.

Successful exploitation allows attackers to exhaust file descriptors pool and memory. Anti-virus detection functionality will fail if there is no file descriptors available with which to open files. Remote exploitation can be achieved by sending a malicious file in an e-mail message or during an HTTP session.

Solution

Update the affected packages.

See Also

https://marc.info/?l=bugtraq&m=112006402411598

http://www.nessus.org/u?3a7824d9

Plugin Details

Severity: Medium

ID: 18975

File Name: freebsd_pkg_6d18fe19ee6711d983100001020eed82.nasl

Version: 1.17

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:clamav-devel, cpe:/o:freebsd:freebsd, p-cpe:/a:freebsd:freebsd:clamav

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 7/6/2005

Vulnerability Publication Date: 6/29/2005

Reference Information

CVE: CVE-2005-1922