Clam AntiVirus CHM Unpacker and PE Rebuilding Vulnerabilities
SECUNIA ADVISORY ID:
DoS, System access
Clam AntiVirus (clamav) 0.x
Two vulnerabilities have been reported in Clam AntiVirus, which
potentially can be exploited by malicious people to cause a DoS
(Denial of Service) or compromise a vulnerable system.
1) An unspecified error in the CHM unpacker in chmunpack.c can be
exploited to cause a DoS.
2) An unspecified error in rebuildpe.c when rebuilding PE files after
unpacking can be exploited to cause a heap-based buffer overflow.
Update to version 0.88.5.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
Once again :((
But this time i didn't see any public exploit nor PoC.
Arches team, please test clamav-0.88.5 & mark stable if appropriate, thanks.
Works fine on my x86 box. Marked stable.
Stable on the only real 64 bit architorture.
Stable on hppa. Sorry for the delay. Got my machine back running.
Stable on Alpha + ia64.
amd64 team ? we're late regarding the policy and the severity of this vulnerability.
stable on amd64.