FreeBSD : clamav -- Multiple Vulnerabilities (589d8053-0b03-11dd-b4ef-00e07dc4ec84)

Critical Nessus Plugin ID 31983


The remote FreeBSD host is missing one or more security-related updates.


Secunia reports :

Some vulnerabilities have been reported in ClamAV, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system.

1) A boundary error exists within the 'cli_scanpe()' function in libclamav/pe.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted 'Upack' executable.

Successful exploitation allows execution of arbitrary code.

2) A boundary error within the processing of PeSpin packed executables in libclamav/spin.c can be exploited to cause a heap-based buffer overflow.

Successful exploitation may allow execution of arbitrary code.

3) An unspecified error in the processing of ARJ files can be exploited to hang ClamAV.


Update the affected packages.

See Also

Plugin Details

Severity: Critical

ID: 31983

File Name: freebsd_pkg_589d80530b0311ddb4ef00e07dc4ec84.nasl

Version: 1.14

Type: local

Published: 2008/04/18

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:clamav, p-cpe:/a:freebsd:freebsd:clamav-devel, cpe:/o:freebsd:freebsd

Patch Publication Date: 2008/04/15

Vulnerability Publication Date: 2008/04/15

Reference Information

CVE: CVE-2008-1100, CVE-2008-1387

Secunia: 29000

CWE: 119