FreeBSD : clamav -- multiple remote buffer overflows (1db7ecf5-fd24-11d9-b4d6-0007e900f87b)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

An Secunia Advisory reports :

Neel Mehta and Alex Wheeler have reported some vulnerabilities in Clam
AntiVirus, which can be exploited by malicious people to cause a DoS
(Denial of Service) or compromise a vulnerable system.

- Two integer overflow errors in 'libclamav/tnef.c' when processing
TNEF files can be exploited to cause a heap-based buffer overflow via
a specially crafted TNEF file with a length value of -1 in the header.

- An integer overflow error in 'libclamav/chmunpack.c' can be
exploited to cause a heap-based buffer overflow via a specially
crafted CHM file with a chunk entry that has a filename length of -1.

- A boundary error in 'libclamav/fsg.c' when processing a FSG
compressed file can cause a heap-based buffer overflow.

See also :

http://www.rem0te.com/public/images/clamav.pdf
http://www.nessus.org/u?c0ef4c34

Solution :

Update the affected packages.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 19337 (freebsd_pkg_1db7ecf5fd2411d9b4d60007e900f87b.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now