FreeBSD : clamav -- multiple remote buffer overflows (1db7ecf5-fd24-11d9-b4d6-0007e900f87b)

high Nessus Plugin ID 19337

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

An Secunia Advisory reports :

Neel Mehta and Alex Wheeler have reported some vulnerabilities in Clam AntiVirus, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

- Two integer overflow errors in 'libclamav/tnef.c' when processing TNEF files can be exploited to cause a heap-based buffer overflow via a specially crafted TNEF file with a length value of -1 in the header.

- An integer overflow error in 'libclamav/chmunpack.c' can be exploited to cause a heap-based buffer overflow via a specially crafted CHM file with a chunk entry that has a filename length of -1.

- A boundary error in 'libclamav/fsg.c' when processing a FSG compressed file can cause a heap-based buffer overflow.

Solution

Update the affected packages.

See Also

http://www.rem0te.com/public/images/clamav.pdf

http://www.nessus.org/u?86030d22

Plugin Details

Severity: High

ID: 19337

File Name: freebsd_pkg_1db7ecf5fd2411d9b4d60007e900f87b.nasl

Version: 1.14

Type: local

Published: 8/1/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:clamav, p-cpe:/a:freebsd:freebsd:clamav-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 7/25/2005

Vulnerability Publication Date: 7/24/2005

Reference Information

Secunia: 16180