Vulnerability Note VU#858595
ClamAV upack heap buffer overflow vulnerability
The ClamAV anti-virus scanner contains a vulnerability that may allow an attacker to execute code or cause ClamAV to crash.
The Portable Executable (PE) file format is a file format for executable files that is used in Microsoft Windows. PE files can be packed with executable packers, such as upack. The ClamAV anti-virus scanner can unpack and scan PE files that are packed with upack.
From ClamAV bug ID 878:
The vulnerability is caused due to a boundary error within the "cli_scanpe()" function in libclamav/pe.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted "Upack" executable.
Note that the ClamAV team has disabled the scanning of PE files that were packed with upack in older versions of ClamAV to prevent this vulnerability from being exploited.
A remote, unauthenticated attacker may be able to execute arbitrary code or cause ClamAV to crash.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Clam AntiVirus||Affected||15 Apr 2008||18 Apr 2008|
CVSS Metrics (Learn More)
Thanks to Secunia Research and the ClamAV team for information that was used in this report.
This document was written by Ryan Giobbi.
- CVE IDs: CVE-2008-1100 CVE-2008-0314
- Date Public: 14 Apr 2008
- Date First Published: 21 Apr 2008
- Date Last Updated: 29 Apr 2008
- Severity Metric: 3.94
- Document Revision: 31
If you have feedback, comments, or additional information about this vulnerability, please send us email.