ID CVE-2006-1989
Summary Buffer overflow in the get_database function in the HTTP client in Freshclam in ClamAV 0.80 to 0.88.1 might allow remote web servers to execute arbitrary code via long HTTP headers.
References
Vulnerable Configurations
  • cpe:2.3:a:clam_anti-virus:clamav:0.88
    cpe:2.3:a:clam_anti-virus:clamav:0.88
  • cpe:2.3:a:clam_anti-virus:clamav:0.88.1
    cpe:2.3:a:clam_anti-virus:clamav:0.88.1
CVSS
Base: 5.1 (as of 01-05-2006 - 15:38)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200605-03.NASL
    description The remote host is affected by the vulnerability described in GLSA-200605-03 (ClamAV: Buffer overflow in Freshclam) Ulf Harnhammar and an anonymous German researcher discovered that Freshclam fails to check the size of the header data returned by a webserver. Impact : By enticing a user to connect to a malicious webserver an attacker could cause the execution of arbitrary code. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-08-10
    plugin id 21318
    published 2006-05-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21318
    title GLSA-200605-03 : ClamAV: Buffer overflow in Freshclam
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_10_4_7.NASL
    description The remote host is running a version of Mac OS X 10.4.x that is prior to 10.4.7. Mac OS X 10.4.7 contains several security fixes for the following programs : - AFP server - ImageIO - launched - OpenLDAP
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 21763
    published 2006-06-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21763
    title Mac OS X 10.4.x < 10.4.7 Multiple Vulnerabilities
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-1050.NASL
    description Ulf Harnhammar and an anonymous researcher from Germany discovered a vulnerability in the protocol code of freshclam, a command line utility responsible for downloading and installing virus signature updates for ClamAV, the antivirus scanner for Unix. This could lead to a denial of service or potentially the execution of arbitrary code.
    last seen 2019-02-21
    modified 2018-07-20
    plugin id 22592
    published 2006-10-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=22592
    title Debian DSA-1050-1 : clamav - buffer overflow
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2006-080.NASL
    description Ulf Harnhammar discovered that the freshclam tool does not do a proper check for the size of header data received from a web server. This could potentially allow a specially prepared HTTP server to exploit freshclam clients connecting to a database mirror and causing a DoS. The updated packages have been updated to Clamav 0.88.2 which corrects this problem.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 21320
    published 2006-05-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21320
    title Mandrake Linux Security Advisory : clamav (MDKSA-2006:080)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_B088BF48DA3B11DA93E000123FFE8333.NASL
    description Secunia reports : A vulnerability has been reported in ClamAV, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. The vulnerability is caused due to a boundary error within the HTTP client in the Freshclam command line utility. This can be exploited to cause a stack-based buffer overflow when the HTTP headers received from a web server exceeds 8KB. Successful exploitation requires that Freshclam is used to download virus signature updates from a malicious mirror web server e.g. via DNS poisoning.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 21496
    published 2006-05-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21496
    title FreeBSD : clamav -- Freshclam HTTP Header Buffer Overflow Vulnerability (b088bf48-da3b-11da-93e0-00123ffe8333)
refmap via4
apple APPLE-SA-2006-06-27
bid 17754
cert-vn VU#599220
confirm
debian DSA-1050
gentoo GLSA-200605-03
mandriva MDKSA-2006:080
osvdb 25120
sectrack 1016392
secunia
  • 19874
  • 19880
  • 19912
  • 19963
  • 19964
  • 20117
  • 20159
  • 20877
suse
  • SUSE-SA:2006:025
  • SUSE-SR:2006:010
trustix 2006-0024
vupen
  • ADV-2006-1586
  • ADV-2006-2566
xf clamav-freshclam-http-bo(26182)
Last major update 07-03-2011 - 21:34
Published 01-05-2006 - 15:06
Last modified 19-07-2017 - 21:31
Back to Top