Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:DL:CLAMAV-INT

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

ClamAV CHM File Handling Integer Overflow

Release Date

2010/09/15

Update Number

1773

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: ClamAV CHM File Handling Integer Overflow


This signature detects attempts to exploit a known vulnerability in the ClamAV. A successful attack can lead to a integer overflow and arbitrary remote code execution within the context of the process.

Extended Description

ClamAV is susceptible to multiple integer overflow vulnerabilities. Specifically, the vulnerabilities present themselves when the ClamAV antivirus library handles malformed files. This may allow attackers to control the flow of execution, and potentially execute attacker-supplied code in the context of the affected application. ClamAV 0.86.1 and prior versions are reported to be affected.

Affected Products

  • Clam Anti-Virus ClamAV 0.51.0
  • Clam Anti-Virus ClamAV 0.52.0
  • Clam Anti-Virus ClamAV 0.53.0
  • Clam Anti-Virus ClamAV 0.54.0
  • Clam Anti-Virus ClamAV 0.60.0
  • Clam Anti-Virus ClamAV 0.65.0
  • Clam Anti-Virus ClamAV 0.67.0
  • Clam Anti-Virus ClamAV 0.68.0
  • Clam Anti-Virus ClamAV 0.68.0 -1
  • Clam Anti-Virus ClamAV 0.70.0
  • Clam Anti-Virus ClamAV 0.80.0
  • Clam Anti-Virus ClamAV 0.80.0 Rc1
  • Clam Anti-Virus ClamAV 0.80.0 Rc2
  • Clam Anti-Virus ClamAV 0.80.0 Rc3
  • Clam Anti-Virus ClamAV 0.80.0 Rc4
  • Clam Anti-Virus ClamAV 0.81.0
  • Clam Anti-Virus ClamAV 0.82.0
  • Clam Anti-Virus ClamAV 0.83.0
  • Clam Anti-Virus ClamAV 0.84.0
  • Clam Anti-Virus ClamAV 0.84.0 Rc1
  • Clam Anti-Virus ClamAV 0.84.0 Rc2
  • Clam Anti-Virus ClamAV 0.85.0
  • Clam Anti-Virus ClamAV 0.85.1
  • Clam Anti-Virus ClamAV 0.86.0
  • Clam Anti-Virus ClamAV 0.86.0 .1
  • Conectiva Linux 10.0.0
  • Conectiva Linux 9.0.0
  • Debian Linux 3.1.0
  • Debian Linux 3.1.0 Alpha
  • Debian Linux 3.1.0 Amd64
  • Debian Linux 3.1.0 Arm
  • Debian Linux 3.1.0 Hppa
  • Debian Linux 3.1.0 Ia-32
  • Debian Linux 3.1.0 Ia-64
  • Debian Linux 3.1.0 M68k
  • Debian Linux 3.1.0 Mips
  • Debian Linux 3.1.0 Mipsel
  • Debian Linux 3.1.0 Ppc
  • Debian Linux 3.1.0 S/390
  • Debian Linux 3.1.0 Sparc
  • Gentoo Linux
  • Mandriva Corporate Server 3.0.0
  • Mandriva Corporate Server 3.0.0 X86 64
  • Mandriva Linux Mandrake 10.1.0
  • Mandriva Linux Mandrake 10.1.0 X86 64
  • Mandriva Linux Mandrake 10.2.0
  • Mandriva Linux Mandrake 10.2.0 X86 64
  • SuSE Linux Personal 9.1.0
  • SuSE Linux Personal 9.1.0 X86 64
  • SuSE Linux Personal 9.2.0
  • SuSE Linux Personal 9.2.0 X86 64
  • SuSE Linux Personal 9.3.0
  • SuSE Linux Personal 9.3.0 X86 64
  • SuSE Linux Professional 9.1.0
  • SuSE Linux Professional 9.1.0 X86 64
  • SuSE Linux Professional 9.2.0
  • SuSE Linux Professional 9.2.0 X86 64
  • SuSE Linux Professional 9.3.0
  • SuSE Linux Professional 9.3.0 X86 64
  • SuSE SUSE Linux Enterprise Server 9

References

  • BugTraq: 14359
  • CVE: CVE-2005-2450

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out