FreeBSD : clamav -- Multiple Vulnerabilities (589d8053-0b03-11dd-b4ef-00e07dc4ec84)

This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Secunia reports :

Some vulnerabilities have been reported in ClamAV, which can be
exploited by malicious people to cause a DoS (Denial of Service) or to
compromise a vulnerable system.

1) A boundary error exists within the 'cli_scanpe()' function in
libclamav/pe.c. This can be exploited to cause a heap-based buffer
overflow via a specially crafted 'Upack' executable.

Successful exploitation allows execution of arbitrary code.

2) A boundary error within the processing of PeSpin packed executables
in libclamav/spin.c can be exploited to cause a heap-based buffer
overflow.

Successful exploitation may allow execution of arbitrary code.

3) An unspecified error in the processing of ARJ files can be
exploited to hang ClamAV.

See also :

http://www.nessus.org/u?f9c10565

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 31983 (freebsd_pkg_589d80530b0311ddb4ef00e07dc4ec84.nasl)

Bugtraq ID:

CVE ID: CVE-2008-1100
CVE-2008-1387

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now