CVE-2008-5314
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
03/12/2008
Last modified:
09/04/2025
Description
Stack consumption vulnerability in libclamav/special.c in ClamAV before 0.94.2 allows remote attackers to cause a denial of service (daemon crash) via a crafted JPEG file, related to the cli_check_jpeg_exploit, jpeg_check_photoshop, and jpeg_check_photoshop_8bim functions.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* | 0.94.1 (including) | |
| cpe:2.3:a:clam_anti-virus:clamav:0.70:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.71:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.72:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.73:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.74:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.75:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.75.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.80:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.80:rc:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.80:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.80:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.80:rc4:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.81:*:*:*:*:*:*:* | ||
| cpe:2.3:a:clam_anti-virus:clamav:0.81:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html
- http://lurker.clamav.net/message/20081126.150241.55b1e092.en.html
- http://osvdb.org/50363
- http://secunia.com/advisories/32926
- http://secunia.com/advisories/32936
- http://secunia.com/advisories/33016
- http://secunia.com/advisories/33195
- http://secunia.com/advisories/33317
- http://secunia.com/advisories/33937
- http://security.gentoo.org/glsa/glsa-200812-21.xml
- http://sourceforge.net/project/shownotes.php?group_id=86638&release_id=643134
- http://support.apple.com/kb/HT3438
- http://www.debian.org/security/2008/dsa-1680
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A239
- http://www.openwall.com/lists/oss-security/2008/12/01/8
- http://www.securityfocus.com/bid/32555
- http://www.securitytracker.com/id?1021296=
- http://www.ubuntu.com/usn/usn-684-1
- http://www.vupen.com/english/advisories/2008/3311
- http://www.vupen.com/english/advisories/2009/0422
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46985
- https://www.exploit-db.com/exploits/7330
- https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1266
- http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html
- http://lurker.clamav.net/message/20081126.150241.55b1e092.en.html
- http://osvdb.org/50363
- http://secunia.com/advisories/32926
- http://secunia.com/advisories/32936
- http://secunia.com/advisories/33016
- http://secunia.com/advisories/33195
- http://secunia.com/advisories/33317
- http://secunia.com/advisories/33937
- http://security.gentoo.org/glsa/glsa-200812-21.xml
- http://sourceforge.net/project/shownotes.php?group_id=86638&release_id=643134
- http://support.apple.com/kb/HT3438
- http://www.debian.org/security/2008/dsa-1680
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A239
- http://www.openwall.com/lists/oss-security/2008/12/01/8
- http://www.securityfocus.com/bid/32555
- http://www.securitytracker.com/id?1021296=
- http://www.ubuntu.com/usn/usn-684-1
- http://www.vupen.com/english/advisories/2008/3311
- http://www.vupen.com/english/advisories/2009/0422
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46985
- https://www.exploit-db.com/exploits/7330
- https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1266



