ClamAV < 0.98.7 Multiple Vulnerabilities

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The antivirus service running on the remote host is affected by
multiple vulnerabilities.

Description :

According to its version, the ClamAV clamd antivirus daemon on the
remote host is prior to 0.98.7. It is, therefore, affected
by multiple vulnerabilities :

- An unspecified flaw exists in the pefromupx() function
in upx.c. A remote attacker can exploit this flaw, via a
specially crafted file, to crash the application.
(CVE-2015-2170)

- An unspecified flaw exists in the yc_poly_emulator()
function in yc.c. A remote attacker can exploit this
flaw, via a specially crafted y0da cryptor file, to
cause an infinite loop and application hang.
(CVE-2015-2221)

- An unspecified flaw exists in the cli_scanpe() function
in pe.c. A remote attacker can exploit this, via a
specially crafted petite packer file, to crash the
program. (CVE-2015-2222)

- An integer overflow condition exists in the bundled
Henry Spencer regex library in the regcomp() function in
regcomp.c due to improper validation of user-supplied
input. A remote attacker can exploit this to cause a
buffer overflow, resulting in a denial of service or the
execution of arbitrary code. (CVE-2015-2305)

- An unspecified flaw exists when handling specially
crafted xz archive files. A remote attacker can exploit
this to cause an infinite loop. (CVE-2015-2668)

See also :

http://blog.clamav.net/2015/04/clamav-0987-has-been-released.html

Solution :

Upgrade to ClamAV 0.98.7 or later.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.0
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 83352 ()

Bugtraq ID: 72611
72611
74472

CVE ID: CVE-2015-2170
CVE-2015-2221
CVE-2015-2222
CVE-2015-2305
CVE-2015-2668

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now