FreeBSD : clamav -- Freshclam HTTP Header Buffer Overflow Vulnerability (b088bf48-da3b-11da-93e0-00123ffe8333)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Secunia reports :

A vulnerability has been reported in ClamAV, which can be exploited by
malicious people to cause a DoS (Denial of Service) and potentially to
compromise a vulnerable system.

The vulnerability is caused due to a boundary error within the HTTP
client in the Freshclam command line utility. This can be exploited to
cause a stack-based buffer overflow when the HTTP headers received
from a web server exceeds 8KB.

Successful exploitation requires that Freshclam is used to download
virus signature updates from a malicious mirror web server e.g. via
DNS poisoning.

See also :

http://www.clamav.net/security/0.88.2.html
http://www.nessus.org/u?64371d07

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.1
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21496 (freebsd_pkg_b088bf48da3b11da93e000123ffe8333.nasl)

Bugtraq ID:

CVE ID: CVE-2006-1989

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now