Vulnerabilities > CVE-2005-2920 - Unspecified vulnerability in Clam Anti-Virus Clamav

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Buffer overflow in libclamav/upx.c in Clam AntiVirus (ClamAV) before 0.87 allows remote attackers to execute arbitrary code via a crafted UPX packed executable.

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-824.NASL
    descriptionTwo vulnerabilities have been discovered in Clam AntiVirus, the antivirus scanner for Unix, designed for integration with mail servers to perform attachment scanning. The following problems were identified : - CAN-2005-2919 A potentially infinite loop could lead to a denial of service. - CAN-2005-2920 A buffer overflow could lead to a denial of service.
    last seen2020-06-01
    modified2020-06-02
    plugin id19793
    published2005-10-05
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19793
    titleDebian DSA-824-1 : clamav - infinite loop, buffer overflow
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200509-13.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200509-13 (Clam AntiVirus: Multiple vulnerabilities) Clam AntiVirus is vulnerable to a buffer overflow in
    last seen2020-06-01
    modified2020-06-02
    plugin id19812
    published2005-10-05
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/19812
    titleGLSA-200509-13 : Clam AntiVirus: Multiple vulnerabilities
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SA_2005_055.NASL
    descriptionThe remote host is missing the patch for the advisory SUSE-SA:2005:055 (clamav). This update upgrades clamav to version 0.87. It fixes vulnerabilities in handling of UPX and FSG compressed executables, which could lead to a remote attacker executing code within the daemon using clamav. These are tracked by the Mitre CVE IDs CVE-2005-2919 and CVE-2005-2920. Also following bugs were fixed: - Support for PE files, Zip and Cabinet archives has been improved and other small bugfixes have been made. - The new option
    last seen2019-10-28
    modified2005-10-05
    plugin id19934
    published2005-10-05
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19934
    titleSUSE-SA:2005:055: clamav
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2005-166.NASL
    descriptionA vulnerability was discovered in ClamAV versions prior to 0.87. A buffer overflow could occure when processing malformed UPX-packed executables. As well, it could be sent into an infinite loop when processing specially crafted FSG-packed executables. ClamAV version 0.87 is provided with this update which isn
    last seen2020-06-01
    modified2020-06-02
    plugin id19921
    published2005-10-05
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19921
    titleMandrake Linux Security Advisory : clamav (MDKSA-2005:166)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_271498A92CD411DAA2630001020EED82.NASL
    descriptionGentoo Linux Security Advisory reports : Clam AntiVirus is vulnerable to a buffer overflow in
    last seen2020-06-01
    modified2020-06-02
    plugin id21403
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21403
    titleFreeBSD : clamav -- arbitrary code execution and DoS vulnerabilities (271498a9-2cd4-11da-a263-0001020eed82)