Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200601-07] ClamAV: Remote execution of arbitrary code

Vulnerability Assessment Details

[GLSA-200601-07] ClamAV: Remote execution of arbitrary code

Vulnerability Assessment Summary
ClamAV: Remote execution of arbitrary code

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200601-07
(ClamAV: Remote execution of arbitrary code)

Zero Day Initiative (ZDI) reported a heap buffer overflow
vulnerability. The vulnerability is due to an incorrect boundary check
of the user-supplied data prior to copying it to an insufficiently
sized memory buffer. The flaw occurs when the application attempts to
handle compressed UPX files.


For example by sending a maliciously crafted UPX file into a mail
server that is integrated with ClamAV, a remote attacker's supplied
code could be executed with escalated rights.


There is no known workaround at this time.


All ClamAV users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88"

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: (C) 2006 Michel Arboi

Cables, Connectors

Hitachi HTS54080G9AT00 80GB 5400RPM 2.5" IDE Laptop Hard Drive - HD153
Hitachi HTS54080G9AT00  80GB 5400RPM 2.5WL500GBS 500GB 16MB Cache 7200RPM Hard Drive SATA
WL500GBS 500GB 16MB Cache 7200RPM Hard Drive SATA pictureSeagate Expansion 8TB USB 3.0 3.5" Desktop External Hard Drive STEB8000100 Black
Seagate Expansion 8TB USB 3.0 3.5


No Discussions have been posted on this vulnerability.