Vulnerabilities > CVE-2005-3303 - Unspecified vulnerability in Clam Anti-Virus Clamav
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN clam-anti-virus
nessus
Summary
The FSG unpacker (fsg.c) in Clam AntiVirus (ClamAV) 0.80 through 0.87 allows remote attackers to cause "memory corruption" and execute arbitrary code via a crafted FSG 1.33 file.
Vulnerable Configurations
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200511-04.NASL description The remote host is affected by the vulnerability described in GLSA-200511-04 (ClamAV: Multiple vulnerabilities) ClamAV has multiple security flaws: a boundary check was performed incorrectly in petite.c, a buffer size calculation in unfsg_133 was incorrect in fsg.c, a possible infinite loop was fixed in tnef.c and a possible infinite loop in cabd_find was fixed in cabd.c . In addition to this, Marcin Owsiany reported that a corrupted DOC file causes a segmentation fault in ClamAV. Impact : By sending a malicious attachment to a mail server that is hooked with ClamAV, a remote attacker could cause a Denial of Service or the execution of arbitrary code. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 20154 published 2005-11-07 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/20154 title GLSA-200511-04 : ClamAV: Multiple vulnerabilities NASL family Debian Local Security Checks NASL id DEBIAN_DSA-887.NASL description Several vulnerabilities have been discovered in Clam AntiVirus, the antivirus scanner for Unix, designed for integration with mail servers to perform attachment scanning. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2005-3239 The OLE2 unpacker allows remote attackers to cause a segmentation fault via a DOC file with an invalid property tree, which triggers an infinite recursion. - CVE-2005-3303 A specially crafted executable compressed with FSG 1.33 could cause the extractor to write beyond buffer boundaries, allowing an attacker to execute arbitrary code. - CVE-2005-3500 A specially crafted CAB file could cause ClamAV to be locked in an infinite loop and use all available processor resources, resulting in a denial of service. - CVE-2005-3501 A specially crafted CAB file could cause ClamAV to be locked in an infinite loop and use all available processor resources, resulting in a denial of service. last seen 2020-06-01 modified 2020-06-02 plugin id 22753 published 2006-10-14 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/22753 title Debian DSA-887-1 : clamav - several vulnerabilities NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2005-205.NASL description A number of vulnerabilities were discovered in ClamAV versions prior to 0.87.1 : The OLE2 unpacker in clamd allows remote attackers to cause a DoS (segfault) via a DOC file with an invalid property tree (CVE-2005-3239) The FSG unpacker allows remote attackers to cause last seen 2020-06-01 modified 2020-06-02 plugin id 20439 published 2006-01-15 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20439 title Mandrake Linux Security Advisory : clamav (MDKSA-2005:205)
References
- http://archives.neohapsis.com/archives/bugtraq/2005-11/0041.html
- http://www.zerodayinitiative.com/advisories/ZDI-05-002.html
- http://sourceforge.net/project/shownotes.php?release_id=368319
- http://secunia.com/advisories/17434
- http://www.debian.org/security/2005/dsa-887
- http://www.gentoo.org/security/en/glsa/glsa-200511-04.xml
- http://www.securityfocus.com/bid/15318
- http://securitytracker.com/id?1015154
- http://secunia.com/advisories/17559
- http://secunia.com/advisories/17184
- http://secunia.com/advisories/17448
- http://secunia.com/advisories/17451
- http://secunia.com/advisories/17501
- http://www.osvdb.org/20482
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:205
- http://securityreason.com/securityalert/146
- http://www.vupen.com/english/advisories/2005/2294