Vulnerabilidad en ClamAV before 0.93, provocar una denegación de servicio (caída) (CVE-2008-1837)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-399
Error en la gestión de recursos
Fecha de publicación:
16/04/2008
Última modificación:
09/04/2025
Descripción
libclamunrar de ClamAV before 0.93 permite a atacantes remotos provocar una denegación de servicio (caída) a través de ficheros RAR manipulados que disparan "problemas de memoria", tal como lo demostrado por el paquete de pruebas PROTOS GENOME de Archive Formats.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:* | 0.92.1 (incluyendo) | |
cpe:2.3:a:clam_anti-virus:clamav:0.15:*:*:*:*:*:*:* | ||
cpe:2.3:a:clam_anti-virus:clamav:0.20:*:*:*:*:*:*:* | ||
cpe:2.3:a:clam_anti-virus:clamav:0.21:*:*:*:*:*:*:* | ||
cpe:2.3:a:clam_anti-virus:clamav:0.22:*:*:*:*:*:*:* | ||
cpe:2.3:a:clam_anti-virus:clamav:0.23:*:*:*:*:*:*:* | ||
cpe:2.3:a:clam_anti-virus:clamav:0.24:*:*:*:*:*:*:* | ||
cpe:2.3:a:clam_anti-virus:clamav:0.51:*:*:*:*:*:*:* | ||
cpe:2.3:a:clam_anti-virus:clamav:0.52:*:*:*:*:*:*:* | ||
cpe:2.3:a:clam_anti-virus:clamav:0.53:*:*:*:*:*:*:* | ||
cpe:2.3:a:clam_anti-virus:clamav:0.54:*:*:*:*:*:*:* | ||
cpe:2.3:a:clam_anti-virus:clamav:0.60:*:*:*:*:*:*:* | ||
cpe:2.3:a:clam_anti-virus:clamav:0.60p:*:*:*:*:*:*:* | ||
cpe:2.3:a:clam_anti-virus:clamav:0.65:*:*:*:*:*:*:* | ||
cpe:2.3:a:clam_anti-virus:clamav:0.67:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00009.html
- http://secunia.com/advisories/29891
- http://secunia.com/advisories/30328
- http://secunia.com/advisories/31576
- http://secunia.com/advisories/31882
- http://security.gentoo.org/glsa/glsa-200805-19.xml
- http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A088
- http://www.securityfocus.com/bid/28784
- http://www.us-cert.gov/cas/techalerts/TA08-260A.html
- http://www.vupen.com/english/advisories/2008/1227/references
- http://www.vupen.com/english/advisories/2008/2584
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41870
- https://wwws.clamav.net/bugzilla/show_bug.cgi?id=898
- http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00009.html
- http://secunia.com/advisories/29891
- http://secunia.com/advisories/30328
- http://secunia.com/advisories/31576
- http://secunia.com/advisories/31882
- http://security.gentoo.org/glsa/glsa-200805-19.xml
- http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A088
- http://www.securityfocus.com/bid/28784
- http://www.us-cert.gov/cas/techalerts/TA08-260A.html
- http://www.vupen.com/english/advisories/2008/1227/references
- http://www.vupen.com/english/advisories/2008/2584
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41870
- https://wwws.clamav.net/bugzilla/show_bug.cgi?id=898