ClamAV: Multiple Vulnerabilities — GLSA 200610-10

ClamAV is vulnerable to a heap-based buffer overflow potentially allowing remote execution of arbitrary code and a Denial of Service.

Affected packages

app-antivirus/clamav on all architectures
Affected versions < 0.88.5
Unaffected versions >= 0.88.5

Background

ClamAV is a GPL virus scanner.

Description

Damian Put and an anonymous researcher reported a potential heap-based buffer overflow vulnerability in rebuildpe.c responsible for the rebuilding of an unpacked PE file, and a possible crash in chmunpack.c in the CHM unpacker.

Impact

By sending a malicious attachment to a mail server running ClamAV, or providing a malicious file to ClamAV through any other method, a remote attacker could cause a Denial of Service and potentially the execution of arbitrary code with the permissions of the user running ClamAV.

Workaround

There is no known workaround at this time.

Resolution

All ClamAV users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88.5"

References

Release date
October 24, 2006

Latest revision
October 24, 2006: 01

Severity
high

Exploitable
remote

Bugzilla entries