CERTA-2008-AVI-382
Vulnerability from certfr_avis

Deux vulnérabilités ont été découvertes dans l'antivirus ClamAV. L'exploitation de ces vulnérabilités permet de réaliser un déni de service à distance.

Description

Deux vulnérabilités résultant d'une mauvaise gestion aux limites ont été découvertes dans le traitement par ClamAV des fichiers modifiés par le packer Petite. L'exploitation de cette vulnérabilité permet de réaliser un déni de service sur l'antivirus.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

ClamAV versions antérieures à la version 0.93.3.

Impacted products
Vendor Product Description

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eClamAV versions ant\u00e9rieures \u00e0 la  version 0.93.3.\u003c/p\u003e",
  "content": "## Description\n\nDeux vuln\u00e9rabilit\u00e9s r\u00e9sultant d\u0027une mauvaise gestion aux limites ont \u00e9t\u00e9\nd\u00e9couvertes dans le traitement par ClamAV des fichiers modifi\u00e9s par le\npacker Petite. L\u0027exploitation de cette vuln\u00e9rabilit\u00e9 permet de r\u00e9aliser\nun d\u00e9ni de service sur l\u0027antivirus.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2008-3215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-3215"
    },
    {
      "name": "CVE-2008-2713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-2713"
    }
  ],
  "initial_release_date": "2008-07-29T00:00:00",
  "last_revision_date": "2008-07-29T00:00:00",
  "links": [
    {
      "title": "Mises \u00e0 jour de s\u00e9curit\u00e9 Fedora FEDORA-2008-5476 et    FEDORA-2008-6422 :",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00763.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDVSA-2008:122 du 24 juin    2008 :",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:122"
    },
    {
      "title": "Mises \u00e0 jour de s\u00e9curit\u00e9 Fedora FEDORA-2008-5476 et    FEDORA-2008-6422 :",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00617.html"
    },
    {
      "title": "Publication de mises \u00e0 jour ClamAV num\u00e9ros 605577 et 611890    :",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=605577\u0026group_id=86638"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Debian DSA 1616 du 26 juillet 2008 :",
      "url": "http://www.debian.org/security/2008/dsa-1616"
    },
    {
      "title": "Publication de mises \u00e0 jour ClamAV num\u00e9ros 605577 et 611890    :",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=611890\u0026group_id=86638"
    }
  ],
  "reference": "CERTA-2008-AVI-382",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2008-07-29T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Deux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans l\u0027antivirus ClamAV.\nL\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet de r\u00e9aliser un d\u00e9ni de\nservice \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s de l\u0027antivirus ClamAV",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Note de version ClamAV du 07 juillet 2008",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…