Vulnerabilities > CVE-2008-5747 - Resource Management Errors vulnerability in F-Prot Antivirus 4.6.8
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
F-Prot 4.6.8 for GNU/Linux allows remote attackers to bypass anti-virus protection via a crafted ELF program with a "corrupted" header that still allows the program to be executed. NOTE: due to an error in the initial disclosure, F-secure was incorrectly stated as the vendor.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200904-14.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200904-14 (F-PROT Antivirus: Multiple Denial of Service vulnerabilities) The following vulnerabilities were found: Multiple errors when processing UPX, ASPack or Microsoft Office files (CVE-2008-3243). Infinite Sergio Alvarez of n.runs AG reported an invalid memory access when processing a CHM file with a large nb_dir value (CVE-2008-3244). Jonathan Brossard from iViZ Techno Solutions reported that F-PROT Antivirus does not correctly process ELF binaries with corrupted headers (CVE-2008-5747). Impact : A remote attacker could entice a user or automated system to scan a specially crafted file, leading to a crash or infinite loop. Workaround : There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 36158 |
published | 2009-04-15 |
reporter | This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/36158 |
title | GLSA-200904-14 : F-PROT Antivirus: Multiple Denial of Service vulnerabilities |
code |
|
References
- http://secunia.com/advisories/34700
- http://secunia.com/advisories/34700
- http://security.gentoo.org/glsa/glsa-200904-14.xml
- http://security.gentoo.org/glsa/glsa-200904-14.xml
- http://securityreason.com/securityalert/4822
- http://securityreason.com/securityalert/4822
- http://www.ivizsecurity.com/security-advisory-iviz-sr-08016.html
- http://www.ivizsecurity.com/security-advisory-iviz-sr-08016.html
- http://www.securityfocus.com/archive/1/499083
- http://www.securityfocus.com/archive/1/499083
- http://www.securityfocus.com/archive/1/499305/100/0/threaded
- http://www.securityfocus.com/archive/1/499305/100/0/threaded
- http://www.securityfocus.com/archive/1/499501/100/0/threaded
- http://www.securityfocus.com/archive/1/499501/100/0/threaded
- http://www.securityfocus.com/bid/32753
- http://www.securityfocus.com/bid/32753