header-logo
Suggest Exploit
vendor:
ClamAV
by:
SecurityFocus
7.5
CVSS
HIGH
Heap Buffer-Overflow
119
CWE
Product Name: ClamAV
Affected Version From: 0.88.2
Affected Version To: 0.88.3
Patch Exists: YES
Related CWE: N/A
CPE: a:clamav:clamav
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

ClamAV Heap Buffer-Overflow Vulnerability

ClamAV is prone to a heap buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. This issue occurs when the application attempts to handle compressed UPX files. Exploiting this issue could allow attacker-supplied machine code to execute in the context of the affected application. The issue would occur when the malformed file is scanned manually or automatically in deployments such as email gateways.

Mitigation:

Users should upgrade to the latest version of ClamAV.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/19381/info

ClamAV is prone to a heap buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. 

This issue occurs when the application attempts to handle compressed UPX files. 

Exploiting this issue could allow attacker-supplied machine code to execute in the context of the affected application. The issue would occur when the malformed file is scanned manually or automatically in deployments such as email gateways.

ClamAV versions 0.88.2 and 0.88.3 are vulnerable to this issue; prior versions may also be affected.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28348.exe