Vulnerabilities > CVE-2006-0162 - Buffer Overflow vulnerability in Clam Anti-Virus ClamAV UPX Compressed File Heap

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
clam-anti-virus
nessus

Summary

Heap-based buffer overflow in libclamav/upx.c in Clam Antivirus (ClamAV) before 0.88 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted UPX files.

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-947.NASL
    descriptionA heap overflow has been discovered in ClamAV, a virus scanner, which could allow an attacker to execute arbitrary code by sending a carefully crafted UPX-encoded executable to a system running ClamAV. In addition, other potential overflows have been corrected. Packages for the ARM architecture were not available when DSA 947-1 was released; these packages are now available. Also, DSA 947-1 incorrectly identified the package version which corrected these issues in the unstable distribution (sid).
    last seen2020-06-01
    modified2020-06-02
    plugin id22813
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22813
    titleDebian DSA-947-2 : clamav - heap overflow
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_612A34EC81DC11DAA0430002A5C3D308.NASL
    descriptionThe Zero Day Initiative reports : This vulnerability allows remote attackers to execute arbitrary code on vulnerable Clam AntiVirus installations. Authentication is not required to exploit this vulnerability. This specific flaw exists within libclamav/upx.c during the unpacking of executable files compressed with UPX. Due to an invalid size calculation during a data copy from the user-controlled file to heap allocated memory, an exploitable memory corruption condition is created.
    last seen2020-06-01
    modified2020-06-02
    plugin id21439
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21439
    titleFreeBSD : clamav -- possible heap overflow in the UPX code (612a34ec-81dc-11da-a043-0002a5c3d308)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2006-016.NASL
    descriptionA heap-based buffer overflow was discovered in ClamAV versions prior to 0.88 which allows remote attackers to cause a crash and possibly execute arbitrary code via specially crafted UPX files. This update provides ClamAV 0.88 which corrects this issue and also fixes some other bugs.
    last seen2020-06-01
    modified2020-06-02
    plugin id20795
    published2006-01-22
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20795
    titleMandrake Linux Security Advisory : clamav (MDKSA-2006:016)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200601-07.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200601-07 (ClamAV: Remote execution of arbitrary code) Zero Day Initiative (ZDI) reported a heap buffer overflow vulnerability. The vulnerability is due to an incorrect boundary check of the user-supplied data prior to copying it to an insufficiently sized memory buffer. The flaw occurs when the application attempts to handle compressed UPX files. Impact : For example by sending a maliciously crafted UPX file into a mail server that is integrated with ClamAV, a remote attacker
    last seen2020-06-01
    modified2020-06-02
    plugin id20417
    published2006-01-15
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20417
    titleGLSA-200601-07 : ClamAV: Remote execution of arbitrary code