CVE-2008-0318

Integer overflow in the cli_scanpe function in libclamav in ClamAV before 0.92.1, as used in clamd, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Petite packed PE file, which triggers a heap-based buffer overflow.
References
Link Resource
http://bugs.gentoo.org/show_bug.cgi?id=209915
http://docs.info.apple.com/article.html?artnum=307562
http://kolab.org/security/kolab-vendor-notice-19.txt
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=658
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html
http://secunia.com/advisories/28907 Vendor Advisory
http://secunia.com/advisories/28913 Vendor Advisory
http://secunia.com/advisories/28949 Vendor Advisory
http://secunia.com/advisories/29001 Vendor Advisory
http://secunia.com/advisories/29026 Vendor Advisory
http://secunia.com/advisories/29048 Vendor Advisory
http://secunia.com/advisories/29060 Vendor Advisory
http://secunia.com/advisories/29420 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200802-09.xml
http://securitytracker.com/id?1019394
http://sourceforge.net/project/shownotes.php?release_id=575703 Patch
http://support.novell.com/techcenter/psdb/512985d2cd3090bfb93dcb7b551179cf.html
http://www.debian.org/security/2008/dsa-1497
http://www.mandriva.com/security/advisories?name=MDVSA-2008:088
http://www.securityfocus.com/bid/27751
http://www.vupen.com/english/advisories/2008/0503 Vendor Advisory
http://www.vupen.com/english/advisories/2008/0606 Vendor Advisory
http://www.vupen.com/english/advisories/2008/0924/references Vendor Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00462.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00481.html
http://bugs.gentoo.org/show_bug.cgi?id=209915
http://docs.info.apple.com/article.html?artnum=307562
http://kolab.org/security/kolab-vendor-notice-19.txt
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=658
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html
http://secunia.com/advisories/28907 Vendor Advisory
http://secunia.com/advisories/28913 Vendor Advisory
http://secunia.com/advisories/28949 Vendor Advisory
http://secunia.com/advisories/29001 Vendor Advisory
http://secunia.com/advisories/29026 Vendor Advisory
http://secunia.com/advisories/29048 Vendor Advisory
http://secunia.com/advisories/29060 Vendor Advisory
http://secunia.com/advisories/29420 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200802-09.xml
http://securitytracker.com/id?1019394
http://sourceforge.net/project/shownotes.php?release_id=575703 Patch
http://support.novell.com/techcenter/psdb/512985d2cd3090bfb93dcb7b551179cf.html
http://www.debian.org/security/2008/dsa-1497
http://www.mandriva.com/security/advisories?name=MDVSA-2008:088
http://www.securityfocus.com/bid/27751
http://www.vupen.com/english/advisories/2008/0503 Vendor Advisory
http://www.vupen.com/english/advisories/2008/0606 Vendor Advisory
http://www.vupen.com/english/advisories/2008/0924/references Vendor Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00462.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00481.html
Configurations

Configuration 1 (hide)

cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:41

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?id=209915 - () http://bugs.gentoo.org/show_bug.cgi?id=209915 -
References () http://docs.info.apple.com/article.html?artnum=307562 - () http://docs.info.apple.com/article.html?artnum=307562 -
References () http://kolab.org/security/kolab-vendor-notice-19.txt - () http://kolab.org/security/kolab-vendor-notice-19.txt -
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=658 - () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=658 -
References () http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html - () http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html -
References () http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html - () http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html -
References () http://secunia.com/advisories/28907 - Vendor Advisory () http://secunia.com/advisories/28907 - Vendor Advisory
References () http://secunia.com/advisories/28913 - Vendor Advisory () http://secunia.com/advisories/28913 - Vendor Advisory
References () http://secunia.com/advisories/28949 - Vendor Advisory () http://secunia.com/advisories/28949 - Vendor Advisory
References () http://secunia.com/advisories/29001 - Vendor Advisory () http://secunia.com/advisories/29001 - Vendor Advisory
References () http://secunia.com/advisories/29026 - Vendor Advisory () http://secunia.com/advisories/29026 - Vendor Advisory
References () http://secunia.com/advisories/29048 - Vendor Advisory () http://secunia.com/advisories/29048 - Vendor Advisory
References () http://secunia.com/advisories/29060 - Vendor Advisory () http://secunia.com/advisories/29060 - Vendor Advisory
References () http://secunia.com/advisories/29420 - Vendor Advisory () http://secunia.com/advisories/29420 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200802-09.xml - () http://security.gentoo.org/glsa/glsa-200802-09.xml -
References () http://securitytracker.com/id?1019394 - () http://securitytracker.com/id?1019394 -
References () http://sourceforge.net/project/shownotes.php?release_id=575703 - Patch () http://sourceforge.net/project/shownotes.php?release_id=575703 - Patch
References () http://support.novell.com/techcenter/psdb/512985d2cd3090bfb93dcb7b551179cf.html - () http://support.novell.com/techcenter/psdb/512985d2cd3090bfb93dcb7b551179cf.html -
References () http://www.debian.org/security/2008/dsa-1497 - () http://www.debian.org/security/2008/dsa-1497 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:088 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:088 -
References () http://www.securityfocus.com/bid/27751 - () http://www.securityfocus.com/bid/27751 -
References () http://www.vupen.com/english/advisories/2008/0503 - Vendor Advisory () http://www.vupen.com/english/advisories/2008/0503 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/0606 - Vendor Advisory () http://www.vupen.com/english/advisories/2008/0606 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/0924/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/0924/references - Vendor Advisory
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00462.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00462.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00481.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00481.html -

Information

Published : 2008-02-12 20:00

Updated : 2024-11-21 00:41


NVD link : CVE-2008-0318

Mitre link : CVE-2008-0318

CVE.ORG link : CVE-2008-0318


JSON object : View

Products Affected

clam_anti-virus

  • clamav
CWE
CWE-189

Numeric Errors