clamav
Page content
- Author: voroskoi
- Vulnerable: 0.91.2-1
- Unaffected: 0.91.2-2sayshell1
Some vulnerabilities have been reported in ClamAV, where one vulnerability has an unknown impact and others can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.
- An integer overflow error exists within the “cli_scanpe()” function when handling MEW packed executables. This can be exploited to cause a heap-based buffer overflow via specially crafted “ssize” and “dsize” values. Successful exploitation allows execution of arbitrary code.
- An off-by-one error exists within libclamav/mspack.c when handling MSZIP compressed files. This can be exploited to e.g. crash the scanner or potentially execute arbitrary code via a specially crafted MSZIP compressed file.
- An boundary error exists within the bzip2 “BZ_GET_FAST()” and “BZ_GET_FAST_C()” decompression macros in libclamav/nsis/bzlib_private.h.
- Bug Tracker URL: http://bugs.frugalware.org/task/2679