Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200402-07] Clam Antivirus DoS vulnerability


Vulnerability Assessment Details

[GLSA-200402-07] Clam Antivirus DoS vulnerability

Vulnerability Assessment Summary
Clam Antivirus DoS vulnerability

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200402-07
(Clam Antivirus DoS vulnerability)


Oliver Eikemeier of Fillmore Labs discovered the overflow in Clam AV 0.65
when it handled malformed UUEncoded messages, causing the daemon to shut
down.
The problem originated in libclamav which calculates the line length of an
uuencoded message by taking the ASCII value of the first character minus 64
while doing an assertion if the length is not in the permited range,
effectively terminating the calling program as clamav would not be
available.

Impact

A malformed message such as the one below would cause a denial of service,
and depending on the server configuration this may impact other daemons
relying on Clam AV in a fatal manner.
To exploit the vulnerability, you can add the following to ~/clamtest.mbox:
From -
begin 644 byebye
byebye
end
Then do "clamscan --mbox -v ~/clamtest.mbox" or "clamdscan
-v ~/clamtest.mbox
ps ax | grep clam": the former will cause an
assertion and a segmentation fault, the latter would cause the daemon to
shut down.

Workaround

There is no immediate workaround, a software upgrade is required.


Solution:
All users are urged to upgrade their Clam AV installations to Clam AV 0.67:
# emerge sync
# emerge -pv ">=net-mail/clamav-0.6.7"
# emerge ">=net-mail/clamav-0.6.7"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

Apple Xserve, 2x Quad Core Xeon X5550 2.66GHz, 12GB RAM 2x 2TB 1x 300GB
$700.0
Apple Xserve, 2x Quad Core Xeon X5550 2.66GHz, 12GB RAM 2x 2TB 1x 300GB pictureDell PowerEdge R710 2x L5640 2.26GHz 6 Core 96GB 8x 128GB SATA SSD PERC 6/i
$1130.0
Dell PowerEdge R710 2x L5640 2.26GHz 6 Core 96GB 8x 128GB SATA SSD PERC 6/i pictureDell PowerEdge R630 2x E5-2660v3 2.6GHz 10 Core 256GB, 8x 600GB 10K 12Gb/s, H730
$6300.0
Dell PowerEdge R630 2x E5-2660v3 2.6GHz 10 Core 256GB, 8x 600GB 10K 12Gb/s, H730 pictureDell PowerEdge R710 2x X5650 2.66GHz 6 Core 128GB 6x 3TB 7.2K SAS PERC H700
$1605.0
Dell PowerEdge R710 2x X5650 2.66GHz 6 Core 128GB 6x 3TB 7.2K SAS PERC H700 picture


Discussions

No Discussions have been posted on this vulnerability.