CVE-2008-2713
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
16/06/2008
Last modified:
09/04/2025
Description
libclamav/petite.c in ClamAV before 0.93.1 allows remote attackers to cause a denial of service via a crafted Petite file that triggers an out-of-bounds read.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:clam_anti-virus:clamav:0.15:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.20:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.21:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.22:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.23:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.24:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.51:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.52:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.53:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.54:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.60:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.60p:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.65:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.67:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.68:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://kolab.org/security/kolab-vendor-notice-21.txt
- http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html
- http://secunia.com/advisories/30657
- http://secunia.com/advisories/30785
- http://secunia.com/advisories/30829
- http://secunia.com/advisories/30967
- http://secunia.com/advisories/31091
- http://secunia.com/advisories/31167
- http://secunia.com/advisories/31206
- http://secunia.com/advisories/31437
- http://secunia.com/advisories/31576
- http://secunia.com/advisories/31882
- http://security.gentoo.org/glsa/glsa-200808-07.xml
- http://sourceforge.net/project/shownotes.php?release_id=605577&group_id=86638
- http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=/branches/0.93/libclamav/petite.c&rev=3886
- http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html
- http://www.debian.org/security/2008/dsa-1616
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A122
- http://www.openwall.com/lists/oss-security/2008/06/15/2
- http://www.openwall.com/lists/oss-security/2008/06/17/8
- http://www.securityfocus.com/bid/29750
- http://www.securitytracker.com/id?1020305=
- http://www.us-cert.gov/cas/techalerts/TA08-260A.html
- http://www.vupen.com/english/advisories/2008/1855/references
- http://www.vupen.com/english/advisories/2008/2584
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43133
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00617.html
- https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00763.html
- https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1000
- http://kolab.org/security/kolab-vendor-notice-21.txt
- http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html
- http://secunia.com/advisories/30657
- http://secunia.com/advisories/30785
- http://secunia.com/advisories/30829
- http://secunia.com/advisories/30967
- http://secunia.com/advisories/31091
- http://secunia.com/advisories/31167
- http://secunia.com/advisories/31206
- http://secunia.com/advisories/31437
- http://secunia.com/advisories/31576
- http://secunia.com/advisories/31882
- http://security.gentoo.org/glsa/glsa-200808-07.xml
- http://sourceforge.net/project/shownotes.php?release_id=605577&group_id=86638
- http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=/branches/0.93/libclamav/petite.c&rev=3886
- http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html
- http://www.debian.org/security/2008/dsa-1616
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A122
- http://www.openwall.com/lists/oss-security/2008/06/15/2
- http://www.openwall.com/lists/oss-security/2008/06/17/8
- http://www.securityfocus.com/bid/29750
- http://www.securitytracker.com/id?1020305=
- http://www.us-cert.gov/cas/techalerts/TA08-260A.html
- http://www.vupen.com/english/advisories/2008/1855/references
- http://www.vupen.com/english/advisories/2008/2584
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43133
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00617.html
- https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00763.html
- https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1000



