FreeBSD : clamav -- Multiple Vulnerabilities (589d8053-0b03-11dd-b4ef-00e07dc4ec84)

critical Nessus Plugin ID 31983


The remote FreeBSD host is missing one or more security-related updates.


Secunia reports :

Some vulnerabilities have been reported in ClamAV, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system.

1) A boundary error exists within the 'cli_scanpe()' function in libclamav/pe.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted 'Upack' executable.

Successful exploitation allows execution of arbitrary code.

2) A boundary error within the processing of PeSpin packed executables in libclamav/spin.c can be exploited to cause a heap-based buffer overflow.

Successful exploitation may allow execution of arbitrary code.

3) An unspecified error in the processing of ARJ files can be exploited to hang ClamAV.


Update the affected packages.

See Also

Plugin Details

Severity: Critical

ID: 31983

File Name: freebsd_pkg_589d80530b0311ddb4ef00e07dc4ec84.nasl

Version: 1.16

Type: local

Published: 4/18/2008

Updated: 1/6/2021

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:clamav, p-cpe:/a:freebsd:freebsd:clamav-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 4/15/2008

Vulnerability Publication Date: 4/15/2008

Reference Information

CVE: CVE-2008-1100, CVE-2008-1387

Secunia: 29000

CWE: 119