clamav
Page content
- Author: voroskoi
- Vulnerable: 0.90.2-1terminus1
- Unaffected: 0.90.2-1terminus2
Some vulnerabilities have been reported in ClamAV, which can be exploited by malicious people to cause a DoS (Denial of Service).
- An error exists within the OLE2 parser when handling objects with malformed FAT partitions and large property sizes. This can be exploited to cause a DoS due to storage and CPU resource consumption by scanning a specially crafted OLE2 file.
- An error in the processing of RAR files can be exploited to crash the process via a specially crafted RAR file.
- A boundary error exists within the file /libclamav/unsp.c, which can be exploited to crash the process via a specially crafted NsPacked file.
- An incorrect regular expression in libclamav/phishcheck.c can be exploited to cause a DoS by consuming all available CPU resources via a specially crafted file.
- Bug Tracker URL: http://bugs.frugalware.org/task/2042
CVEs:
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2650
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3023
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3024
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3025
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3122
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3123