Vulnerabilities > CVE-2007-1745
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The chm_decompress_stream function in libclamav/chmunpack.c in Clam AntiVirus (ClamAV) before 0.90.2 leaks file descriptors, which has unknown impact and attack vectors involving a crafted CHM file, a different vulnerability than CVE-2007-0897. NOTE: some of these details are obtained from third party information.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 |
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200704-21.NASL description The remote host is affected by the vulnerability described in GLSA-200704-21 (ClamAV: Multiple vulnerabilities) iDefense Labs have reported a stack-based buffer overflow in the cab_unstore() function when processing negative values in .cab files. Multiple file descriptor leaks have also been reported in chmunpack.c, pdf.c and dblock.c when processing .chm files. Impact : A remote attacker could send a specially crafted CHM file to the scanner, possibly resulting in the remote execution of arbitrary code with the privileges of the user running ClamAV. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 25109 published 2007-04-30 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25109 title GLSA-200704-21 : ClamAV: Multiple vulnerabilities code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 200704-21. # # The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(25109); script_version("1.13"); script_cvs_date("Date: 2019/08/02 13:32:44"); script_cve_id("CVE-2007-1745", "CVE-2007-1997"); script_xref(name:"GLSA", value:"200704-21"); script_name(english:"GLSA-200704-21 : ClamAV: Multiple vulnerabilities"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-200704-21 (ClamAV: Multiple vulnerabilities) iDefense Labs have reported a stack-based buffer overflow in the cab_unstore() function when processing negative values in .cab files. Multiple file descriptor leaks have also been reported in chmunpack.c, pdf.c and dblock.c when processing .chm files. Impact : A remote attacker could send a specially crafted CHM file to the scanner, possibly resulting in the remote execution of arbitrary code with the privileges of the user running ClamAV. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/200704-21" ); script_set_attribute( attribute:"solution", value: "All ClamAV users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=app-antivirus/clamav-0.90.2'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:clamav"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2007/04/24"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/04/30"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/04/12"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"app-antivirus/clamav", unaffected:make_list("ge 0.90.2"), vulnerable:make_list("lt 0.90.2"))) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get()); else security_hole(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ClamAV"); }
NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2007-098.NASL description iDefense discovered a stack-based overflow in ClamAV when processing negative values in .cab files. As well, multiple file descriptor leaks were also reported and fixed in chmunpack.c, pdf.c, and dblock.c. This update provides ClamAV 0.90.2 which corrects these problems and provides new functionality. last seen 2020-06-01 modified 2020-06-02 plugin id 25189 published 2007-05-10 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25189 title Mandrake Linux Security Advisory : clamav (MDKSA-2007:098) NASL family SuSE Local Security Checks NASL id SUSE_CLAMAV-3081.NASL description The version update to 0.90.2 fixes among other things two security problems. (CVE-2007-1745 / CVE-2007-1997) last seen 2020-06-01 modified 2020-06-02 plugin id 29400 published 2007-12-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/29400 title SuSE 10 Security Update : clamav (ZYPP Patch Number 3081) NASL family MacOS X Local Security Checks NASL id MACOSX_SECUPD2008-002.NASL description The remote host is running a version of Mac OS X 10.5 or 10.4 that does not have the security update 2008-002 applied. This update contains several security fixes for a number of programs. last seen 2020-06-01 modified 2020-06-02 plugin id 31605 published 2008-03-19 reporter This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/31605 title Mac OS X Multiple Vulnerabilities (Security Update 2008-002) NASL family SuSE Local Security Checks NASL id SUSE_CLAMAV-3080.NASL description The version update to 0.90.2 fixes among other things two security problems (CVE-2007-1745, CVE-2007-1997). last seen 2020-06-01 modified 2020-06-02 plugin id 27180 published 2007-10-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27180 title openSUSE 10 Security Update : clamav (clamav-3080) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1281.NASL description Several remote vulnerabilities have been discovered in the Clam anti-virus toolkit. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2007-1745 It was discovered that a file descriptor leak in the CHM handler may lead to denial of service. - CVE-2007-1997 It was discovered that a buffer overflow in the CAB handler may lead to the execution of arbitrary code. - CVE-2007-2029 It was discovered that a file descriptor leak in the PDF handler may lead to denial of service. last seen 2020-06-01 modified 2020-06-02 plugin id 25098 published 2007-04-30 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/25098 title Debian DSA-1281-1 : clamav - several vulnerabilities
References
- http://sourceforge.net/project/shownotes.php?release_id=500765
- http://www.securityfocus.com/bid/23473
- http://secunia.com/advisories/24891
- http://support.novell.com/techcenter/psdb/50a5cb718f20761dd7e0b6b4e0935c52.html
- http://security.gentoo.org/glsa/glsa-200704-21.xml
- http://www.novell.com/linux/security/advisories/2007_26_clamav.html
- http://www.trustix.org/errata/2007/0013/
- http://secunia.com/advisories/24920
- http://secunia.com/advisories/24946
- http://secunia.com/advisories/24996
- http://secunia.com/advisories/25022
- http://www.debian.org/security/2007/dsa-1281
- http://secunia.com/advisories/25028
- http://secunia.com/advisories/25189
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:098
- http://docs.info.apple.com/article.html?artnum=307562
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://secunia.com/advisories/29420
- http://osvdb.org/34913
- http://www.vupen.com/english/advisories/2008/0924/references
- http://www.vupen.com/english/advisories/2007/1378
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33636