The wwunpack function in libclamav/wwunpack.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression.
References
Link | Resource |
---|---|
https://bugzilla.clamav.net/show_bug.cgi?id=11798 | Permissions Required |
https://github.com/varsleak/varsleak-vul/blob/master/clamav-vul/use-after-free/clamav-use-after-free-pe.md | Third Party Advisory |
https://github.com/vrtadmin/clamav-devel/commit/dfc00cd3301a42b571454b51a6102eecf58407bc | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201804-16 | |
https://bugzilla.clamav.net/show_bug.cgi?id=11798 | Permissions Required |
https://github.com/varsleak/varsleak-vul/blob/master/clamav-vul/use-after-free/clamav-use-after-free-pe.md | Third Party Advisory |
https://github.com/vrtadmin/clamav-devel/commit/dfc00cd3301a42b571454b51a6102eecf58407bc | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201804-16 |
Configurations
History
21 Nov 2024, 03:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.clamav.net/show_bug.cgi?id=11798 - Permissions Required | |
References | () https://github.com/varsleak/varsleak-vul/blob/master/clamav-vul/use-after-free/clamav-use-after-free-pe.md - Third Party Advisory | |
References | () https://github.com/vrtadmin/clamav-devel/commit/dfc00cd3301a42b571454b51a6102eecf58407bc - Issue Tracking, Patch, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201804-16 - |
Information
Published : 2017-08-07 03:29
Updated : 2024-11-21 03:29
NVD link : CVE-2017-6420
Mitre link : CVE-2017-6420
CVE.ORG link : CVE-2017-6420
JSON object : View
Products Affected
clamav
- clamav
CWE
CWE-416
Use After Free