GLSA-200909-04 : Clam AntiVirus: Multiple vulnerabilities

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200909-04
(Clam AntiVirus: Multiple vulnerabilities)

Multiple vulnerabilities have been found in ClamAV:
vendor reported a Divide-by-zero error in the PE ('Portable
Executable'; Windows .exe) file handling of ClamAV
Jeffrey Thomas Peckham found a flaw in
libclamav/untar.c, possibly resulting in an infinite loop when
processing TAR archives in clamd and clamscan (CVE-2009-1270).
Martin Olsen reported a vulnerability in the CLI_ISCONTAINED macro
in libclamav/others.h, when processing UPack archives
Nigel disclosed a stack-based buffer overflow
in the 'cli_url_canon()' function in libclamav/phishcheck.c when
processing URLs (CVE-2009-1372).

Impact :

A remote attacker could entice a user or automated system to process a
specially crafted UPack archive or a file containing a specially
crafted URL, possibly resulting in the remote execution of arbitrary
code with the privileges of the user running the application, or a
Denial of Service. Furthermore, a remote attacker could cause a Denial
of Service by supplying a specially crafted TAR archive or PE
executable to a Clam AntiVirus instance.

Workaround :

There is no known workaround at this time.

See also :

Solution :

All Clam AntiVirus users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-antivirus/clamav-0.95.2'

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : false

Family: Gentoo Local Security Checks

Nessus Plugin ID: 40912 (gentoo_GLSA-200909-04.nasl)

Bugtraq ID:

CVE ID: CVE-2008-6680

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now