FreeBSD : clamav -- MS-Expand file handling DoS vulnerability (6d18fe19-ee67-11d9-8310-0001020eed82)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

An iDEFENSE Security Advisory reports :

Remote exploitation of an input validation error in Clam AntiVirus
ClamAV allows attackers to cause a denial of service condition.

The vulnerability specifically exists due to improper behavior during
exceptional conditions.

Successful exploitation allows attackers to exhaust file descriptors
pool and memory. Anti-virus detection functionality will fail if there
is no file descriptors available with which to open files. Remote
exploitation can be achieved by sending a malicious file in an e-mail
message or during an HTTP session.

See also :

http://marc.info/?l=bugtraq&m=112006402411598
http://www.nessus.org/u?e5ec2a0b

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 18975 (freebsd_pkg_6d18fe19ee6711d983100001020eed82.nasl)

Bugtraq ID:

CVE ID: CVE-2005-1922

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now