clamav
Page content
- Author: vmiklos
- Vulnerable: 0.91.2-2sayshell1
- Unaffected: 0.92.1-1sayshell1
Some vulnerabilities have been reported in ClamAV, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.
- An integer overflow error within the “cli_scanpe()” function in libclamav/pe.c can be exploited to cause a heap-based buffer overflow via a specially crafted PE file.
- An error within the “unmew11()” function in libclamav/mew.c can be exploited to corrupt heap memory. Successful exploitation may allow execution of arbitrary code.
- Bug Tracker URL: http://bugs.frugalware.org/task/2771