FreeBSD : clamav -- Freshclam HTTP Header Buffer Overflow Vulnerability (b088bf48-da3b-11da-93e0-00123ffe8333)

Medium Nessus Plugin ID 21496


The remote FreeBSD host is missing one or more security-related updates.


Secunia reports :

A vulnerability has been reported in ClamAV, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system.

The vulnerability is caused due to a boundary error within the HTTP client in the Freshclam command line utility. This can be exploited to cause a stack-based buffer overflow when the HTTP headers received from a web server exceeds 8KB.

Successful exploitation requires that Freshclam is used to download virus signature updates from a malicious mirror web server e.g. via DNS poisoning.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 21496

File Name: freebsd_pkg_b088bf48da3b11da93e000123ffe8333.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2006/05/13

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:clamav, p-cpe:/a:freebsd:freebsd:clamav-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2006/05/03

Vulnerability Publication Date: 2006/05/01

Reference Information

CVE: CVE-2006-1989

Secunia: 19880