CVE-2013-2020

Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read.
References
Link Resource
http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html Patch
http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html
http://secunia.com/advisories/53150 Vendor Advisory
http://secunia.com/advisories/53182 Vendor Advisory
http://support.apple.com/kb/HT5880
http://support.apple.com/kb/HT5892
http://www.mandriva.com/security/advisories?name=MDVSA-2013:159
http://www.openwall.com/lists/oss-security/2013/04/25/2
http://www.openwall.com/lists/oss-security/2013/04/29/20
http://www.securityfocus.com/bid/59434
http://www.ubuntu.com/usn/USN-1816-1
https://bugzilla.clamav.net/show_bug.cgi?id=7055
https://github.com/vrtadmin/clamav-devel/commit/270e368b99e93aa5447d46c797c92c3f9f39f375
http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html Patch
http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html
http://secunia.com/advisories/53150 Vendor Advisory
http://secunia.com/advisories/53182 Vendor Advisory
http://support.apple.com/kb/HT5880
http://support.apple.com/kb/HT5892
http://www.mandriva.com/security/advisories?name=MDVSA-2013:159
http://www.openwall.com/lists/oss-security/2013/04/25/2
http://www.openwall.com/lists/oss-security/2013/04/29/20
http://www.securityfocus.com/bid/59434
http://www.ubuntu.com/usn/USN-1816-1
https://bugzilla.clamav.net/show_bug.cgi?id=7055
https://github.com/vrtadmin/clamav-devel/commit/270e368b99e93aa5447d46c797c92c3f9f39f375
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:suse:linux_enterprise_server:11.0:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc1.1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc3:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.1_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.2_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.3_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.3_p1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91.2_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.92:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.92.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.92_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.93:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.93.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.93.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.93.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.94:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.94.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.94.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95:src1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95:src2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96.5:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.97:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.97:rc:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.97.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.97.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.97.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.97.4:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.97.5:*:*:*:*:*:*:*

History

21 Nov 2024, 01:50

Type Values Removed Values Added
References () http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html - Patch () http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html - Patch
References () http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html - () http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html -
References () http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html - () http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html - () http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html - () http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html - () http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html - () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html -
References () http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html -
References () http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html - () http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html -
References () http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html - () http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html -
References () http://secunia.com/advisories/53150 - Vendor Advisory () http://secunia.com/advisories/53150 - Vendor Advisory
References () http://secunia.com/advisories/53182 - Vendor Advisory () http://secunia.com/advisories/53182 - Vendor Advisory
References () http://support.apple.com/kb/HT5880 - () http://support.apple.com/kb/HT5880 -
References () http://support.apple.com/kb/HT5892 - () http://support.apple.com/kb/HT5892 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:159 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:159 -
References () http://www.openwall.com/lists/oss-security/2013/04/25/2 - () http://www.openwall.com/lists/oss-security/2013/04/25/2 -
References () http://www.openwall.com/lists/oss-security/2013/04/29/20 - () http://www.openwall.com/lists/oss-security/2013/04/29/20 -
References () http://www.securityfocus.com/bid/59434 - () http://www.securityfocus.com/bid/59434 -
References () http://www.ubuntu.com/usn/USN-1816-1 - () http://www.ubuntu.com/usn/USN-1816-1 -
References () https://bugzilla.clamav.net/show_bug.cgi?id=7055 - () https://bugzilla.clamav.net/show_bug.cgi?id=7055 -
References () https://github.com/vrtadmin/clamav-devel/commit/270e368b99e93aa5447d46c797c92c3f9f39f375 - () https://github.com/vrtadmin/clamav-devel/commit/270e368b99e93aa5447d46c797c92c3f9f39f375 -

Information

Published : 2013-05-13 23:55

Updated : 2024-11-21 01:50


NVD link : CVE-2013-2020

Mitre link : CVE-2013-2020

CVE.ORG link : CVE-2013-2020


JSON object : View

Products Affected

canonical

  • ubuntu_linux

suse

  • linux_enterprise_server

clamav

  • clamav
CWE
CWE-189

Numeric Errors