ClamAV: Multiple Denials of Service
Gentoo Linux Security Advisory
||GLSA 200706-05 / clamav
||June 15, 2007
||June 15, 2007: 01
All supported architectures
ClamAV contains several vulnerabilities leading to a Denial of Service.
ClamAV is a GPL virus scanner.
Several vulnerabilities were discovered in ClamAV by various
- Victor Stinner (INL) discovered that the OLE2
parser may enter in an infinite loop (CVE-2007-2650).
boundary error was also reported by an anonymous researcher in the file
unsp.c, which might lead to a buffer overflow (CVE-2007-3023).
- The file unrar.c contains a heap-based buffer overflow via a
modified vm_codesize value from a RAR file (CVE-2007-3123).
- The RAR parsing engine can be bypassed via a RAR file with a header
flag value of 10 (CVE-2007-3122).
- The cli_gentempstream()
function from clamdscan creates temporary files with insecure
A remote attacker could send a specially crafted file to the scanner,
possibly triggering one of the vulnerabilities. The two buffer
overflows are reported to only cause Denial of Service. This would lead
to a Denial of Service by CPU consumption or a crash of the scanner.
The insecure temporary file creation vulnerability could be used by a
local user to access sensitive data.
There is no known workaround at this time.
All ClamAV users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.90.3"