Vulnerability Note VU#180864
Clam AntiVirus fails to properly handle crafted Portable Executable (PE) files
A vulnerability in the way Clam AntiVirus processes Portable Executable (PE) files may lead to execution of arbitrary code.
Clam AntiVirus is a GPL virus scanner that has built-in support for for a number of file types including PE. According to iDefense Public Advisory: 10.15.06:
While processing certain PE elements, two variables can be very large and integer overflow could occur. This would result in less memory being allocated than was expected by the programmer and subsequent code would overflow the heap buffer.
Note that an attacker must send a specially crafted PE file through any email gateway or personal anti-virus client that employs the Clam AntiVirus scanning engine in order to exploit this vulnerability.
A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service condition.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Clam AntiVirus||Affected||-||27 Oct 2006|
|Debian GNU/Linux||Affected||-||27 Oct 2006|
|Gentoo Linux||Affected||-||27 Oct 2006|
|Mandriva, Inc.||Affected||-||27 Oct 2006|
|SUSE Linux||Affected||-||27 Oct 2006|
|Trustix Secure Linux||Affected||-||27 Oct 2006|
CVSS Metrics (Learn More)
This issue was reported in File Release Notes and Changelog for Clam AntiVirus 0.88.5.
This document was written by Chris Taschner.
- CVE IDs: CVE-2006-4182
- Date Public: 16 Oct 2006
- Date First Published: 07 Nov 2006
- Date Last Updated: 07 Nov 2006
- Severity Metric: 10.40
- Document Revision: 10
If you have feedback, comments, or additional information about this vulnerability, please send us email.