Vulnerability Note VU#180864

Clam AntiVirus fails to properly handle crafted Portable Executable (PE) files

Original Release date: 07 Nov 2006 | Last revised: 07 Nov 2006


A vulnerability in the way Clam AntiVirus processes Portable Executable (PE) files may lead to execution of arbitrary code.


Clam AntiVirus is a GPL virus scanner that has built-in support for for a number of file types including PE. According to iDefense Public Advisory: 10.15.06:

    While processing certain PE elements, two variables can be very large and integer overflow could occur. This would result in less memory being allocated than was expected by the programmer and subsequent code would overflow the heap buffer.

Note that an attacker must send a specially crafted PE file through any email gateway or personal anti-virus client that employs the Clam AntiVirus scanning engine in order to exploit this vulnerability.


A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service condition.


Clam AntiVirus has released an updated version to address this issue. Refer to File Release Notes and Changelog for Clam AntiVirus 0.88.5.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Clam AntiVirusAffected-27 Oct 2006
Debian GNU/LinuxAffected-27 Oct 2006
Gentoo LinuxAffected-27 Oct 2006
Mandriva, Inc.Affected-27 Oct 2006
SUSE LinuxAffected-27 Oct 2006
Trustix Secure LinuxAffected-27 Oct 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This issue was reported in File Release Notes and Changelog for Clam AntiVirus 0.88.5.

This document was written by Chris Taschner.

Other Information

  • CVE IDs: CVE-2006-4182
  • Date Public: 16 Oct 2006
  • Date First Published: 07 Nov 2006
  • Date Last Updated: 07 Nov 2006
  • Severity Metric: 10.40
  • Document Revision: 10


If you have feedback, comments, or additional information about this vulnerability, please send us email.