A vulnerability in the way Clam AntiVirus processes Portable Executable (PE) files may lead to execution of arbitrary code.
Clam AntiVirus is a GPL virus scanner that has built-in support for for a number of file types including PE. According to iDefense Public Advisory: 10.15.06:
While processing certain PE elements, two variables can be very large and integer overflow could occur. This would result in less memory being allocated than was expected by the programmer and subsequent code would overflow the heap buffer.
A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service condition.
This issue was reported in File Release Notes and Changelog for Clam AntiVirus 0.88.5.
This document was written by Chris Taschner.
|Date First Published:||2006-11-07|
|Date Last Updated:||2006-11-07 21:41 UTC|