Vulnerabilidad en función de ClamAV (CVE-2011-1003)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-399
Error en la gestión de recursos
Fecha de publicación:
23/02/2011
Última modificación:
11/04/2025
Descripción
Doble vulnerabilidad libre en la función vba_read_project_strings en vba_extract.c en libclamav en ClamAV anterior a v0.97, podría permitir a atacantes remotos ejecutar código arbitrario a través de datos de Visual Basic para Aplicaciones (VBA) manipulados en un documento de Microsoft Office. NOTA: algunos de estos detalles han sido obtenidos de información de terceros.
Impacto
Puntuación base 2.0
6.80
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:* | 0.96.5 (incluyendo) | |
cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.8:rc3:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.14:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.14:pre:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:* | ||
cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba%3Dblob%3Bf%3DChangeLog%3Bhb%3Dclamav-0.97
- http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba%3Dcommit%3Bh%3Dd21fb8d975f8c9688894a8cef4d50d977022e09f
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055771.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055777.html
- http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
- http://openwall.com/lists/oss-security/2011/02/21/1
- http://openwall.com/lists/oss-security/2011/02/21/4
- http://osvdb.org/70937
- http://secunia.com/advisories/43392
- http://secunia.com/advisories/43498
- http://secunia.com/advisories/43752
- http://securitytracker.com/id?1025100=
- http://www.mandriva.com/en/support/security/advisories/?name=MDVA-2011%3A007
- http://www.securityfocus.com/bid/46470
- http://www.ubuntu.com/usn/USN-1076-1
- http://www.vupen.com/english/advisories/2011/0453
- http://www.vupen.com/english/advisories/2011/0458
- http://www.vupen.com/english/advisories/2011/0523
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65544
- https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2486
- http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba%3Dblob%3Bf%3DChangeLog%3Bhb%3Dclamav-0.97
- http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba%3Dcommit%3Bh%3Dd21fb8d975f8c9688894a8cef4d50d977022e09f
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055771.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055777.html
- http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
- http://openwall.com/lists/oss-security/2011/02/21/1
- http://openwall.com/lists/oss-security/2011/02/21/4
- http://osvdb.org/70937
- http://secunia.com/advisories/43392
- http://secunia.com/advisories/43498
- http://secunia.com/advisories/43752
- http://securitytracker.com/id?1025100=
- http://www.mandriva.com/en/support/security/advisories/?name=MDVA-2011%3A007
- http://www.securityfocus.com/bid/46470
- http://www.ubuntu.com/usn/USN-1076-1
- http://www.vupen.com/english/advisories/2011/0453
- http://www.vupen.com/english/advisories/2011/0458
- http://www.vupen.com/english/advisories/2011/0523
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65544
- https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2486