ClamAV < 0.88.0 UPX File Processing Overflow (deprecated)

high Nessus Network Monitor Plugin ID 3362

Synopsis

The remote host is vulnerable to a heap overflow.

Description

The remote host is running ClamAV, an open-source antivirus solution for Unix and Windows systems. This version of ClamAV is reported to be vulnerable to a flaw where the parsing of a malicious file will cause the clamav process to execute arbitrary code. While the details of the attack are currently unknown, it is rumoured that an attacker exploiting this flaw would only need to be able to craft and send a malformed email to a ClamAV server. Successful exploitation results in the server executing arbitrary code or crashing.

Solution

Upgrade to version 0.88.0 or higher.

See Also

http://sourceforge.net/project/shownotes.php?release_id=384086&group_id=86638

Plugin Details

Severity: High

ID: 3362

Family: Web Clients

Published: 1/10/2006

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Reference Information

CVE: CVE-2006-0162

BID: 16191