CVE-2005-0133
CVSS5.0
发布时间 :2005-05-02 00:00:00
修订时间 :2008-09-10 15:35:00
NMCOPS    

[原文]ClamAV 0.80 and earlier allows remote attackers to cause a denial of service (clamd daemon crash) via a ZIP file with malformed headers.


[CNNVD]Clam Anti-Virus ClamAV ZIP文件解析远程拒绝服务漏洞(CNNVD-200505-169)

        ClamAV 0.80以及较早的版本,允许远程攻击者通过包含畸形头的ZIP文件来引起拒绝服务(clamd守护程序崩溃)攻击。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:clam_anti-virus:clamav:0.80
cpe:/a:clam_anti-virus:clamav:0.65
cpe:/a:clam_anti-virus:clamav:0.54
cpe:/a:clam_anti-virus:clamav:0.68
cpe:/a:clam_anti-virus:clamav:0.67
cpe:/a:clam_anti-virus:clamav:0.53
cpe:/a:clam_anti-virus:clamav:0.52
cpe:/a:clam_anti-virus:clamav:0.51
cpe:/a:clam_anti-virus:clamav:0.68.1
cpe:/a:clam_anti-virus:clamav:0.60

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0133
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0133
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-169
(官方数据源) CNNVD

- 其它链接及资源

http://www.trustix.org/errata/2005/0003/
(VENDOR_ADVISORY)  TRUSTIX  2005-0003
http://www.gentoo.org/security/en/glsa/glsa-200501-46.xml
(VENDOR_ADVISORY)  GENTOO  GLSA-200501-46
http://sourceforge.net/project/shownotes.php?release_id=300116
(PATCH)  CONFIRM  http://sourceforge.net/project/shownotes.php?release_id=300116
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000928
(VENDOR_ADVISORY)  CONECTIVA  CLA-2005:928
http://www.mandriva.com/security/advisories?name=MDKSA-2005:025
(UNKNOWN)  MANDRAKE  MDKSA-2005:025

- 漏洞信息

Clam Anti-Virus ClamAV ZIP文件解析远程拒绝服务漏洞
中危 其他
2005-05-02 00:00:00 2005-10-20 00:00:00
远程  
        ClamAV 0.80以及较早的版本,允许远程攻击者通过包含畸形头的ZIP文件来引起拒绝服务(clamd守护程序崩溃)攻击。

- 公告与补丁

        暂无数据

- 漏洞信息 (F35982)

Gentoo Linux Security Advisory 200501-46 (PacketStormID:F35982)
2005-02-01 00:00:00
Gentoo  security.gentoo.org
advisory,denial of service,vulnerability,virus
linux,gentoo
CVE-2005-0133
[点击下载]

Gentoo Linux Security Advisory GLSA 200501-46 - ClamAV contains two vulnerabilities that could lead to Denial of Service and evasion of virus scanning. Versions below 0.81 are affected.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200501-46
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: ClamAV: Multiple issues
      Date: January 31, 2005
      Bugs: #78656, #79194
        ID: 200501-46

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

ClamAV contains two vulnerabilities that could lead to Denial of
Service and evasion of virus scanning.

Background
==========

ClamAV is an antivirus toolkit. It includes a multi-threaded daemon and
a command line scanner.

Affected packages
=================

    -------------------------------------------------------------------
     Package               /  Vulnerable  /                 Unaffected
    -------------------------------------------------------------------
  1  app-antivirus/clamav       <= 0.80                        >= 0.81

Description
===========

ClamAV fails to properly scan ZIP files with special headers
(CAN-2005-0133) and base64 encoded images in URLs.

Impact
======

By sending a base64 encoded image file in a URL an attacker could evade
virus scanning. By sending a specially-crafted ZIP file an attacker
could cause a Denial of Service by crashing the clamd daemon.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All ClamAV users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.81"

References
==========

  [ 1 ] CAN-2005-0133
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0133
  [ 2 ] ClamAV Release Announcement
        http://sourceforge.net/forum/forum.php?forum_id=440649
  [ 3 ] Secunia SA13900
        http://secunia.com/advisories/13900/

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200501-46.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0
    

- 漏洞信息

13342
Clam AntiVirus ZIP Scanning DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Unknown

- 漏洞描述

ClamAV contains a flaw that may allow a remote denial of service. The issue is due to an error in the handling of file information in corrupted ZIP files, and will result in loss of availability for the service.

- 时间线

2005-01-31 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 0.81 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Clam Anti-Virus ClamAV ZIP File Parsing Remote Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 12408
Yes No
2005-01-31 12:00:00 2009-07-12 10:06:00
The individual or individuals responsible for the discovery of this issue are currently unknown; the vendor disclosed this issue.

- 受影响的程序版本

Trustix Secure Linux 2.2
Trustix Secure Linux 2.1
Trustix Secure Linux 1.5
Trustix Secure Enterprise Linux 2.0
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Personal 8.2
S.u.S.E. Linux 8.1
S.u.S.E. Linux 8.0 i386
S.u.S.E. Linux 8.0
Mandriva Linux Mandrake 10.1 x86_64
Mandriva Linux Mandrake 10.1
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
Conectiva Linux 10.0
Clam Anti-Virus ClamAV 0.80 rc4
Clam Anti-Virus ClamAV 0.80 rc3
Clam Anti-Virus ClamAV 0.80 rc2
Clam Anti-Virus ClamAV 0.80 rc1
Clam Anti-Virus ClamAV 0.80
Clam Anti-Virus ClamAV 0.70
Clam Anti-Virus ClamAV 0.68 -1
Clam Anti-Virus ClamAV 0.68
Clam Anti-Virus ClamAV 0.67
+ Gentoo Linux 1.4 _rc3
+ Gentoo Linux 1.4 _rc2
+ Gentoo Linux 1.4 _rc1
+ Gentoo Linux 1.4
Clam Anti-Virus ClamAV 0.65
Clam Anti-Virus ClamAV 0.60
Clam Anti-Virus ClamAV 0.54
Clam Anti-Virus ClamAV 0.53
Clam Anti-Virus ClamAV 0.52
Clam Anti-Virus ClamAV 0.51
ALT Linux ALT Linux Junior 2.3
ALT Linux ALT Linux Compact 2.3
Clam Anti-Virus ClamAV 0.81
+ Gentoo Linux

- 不受影响的程序版本

Clam Anti-Virus ClamAV 0.81
+ Gentoo Linux

- 漏洞讨论

A remote denial of service vulnerability affects ClamAV. This issue is due to a failure of the application to properly handle malicious file content.

An attacker may leverage this issue to crash the Clam Anti-Virus daemon, potentially leaving an affected computer open to infection by malicious code.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

The vendor has released an upgrade dealing with this issue.

Conectiva has released advisory CLA-2005:928 to address this issue. Please see the attached advisory for further information on obtaining and applying fixes.

Gentoo linux has made advisory GLSA 200501-46 dealing with this issue. Gentoo advises that all ClamAV users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.81"

For more information, please see the referenced Gentoo linux advisory.

Mandrake has released advisory MDKSA-2005:025 to address this issue. Please see the referenced advisory for more information.

SuSE Linux has released a security summary report (SUSE-SR:2005:003) that contains fixes to address this and other vulnerabilities. Customers are advised to peruse the referenced advisory for further information regarding obtaining and applying appropriate updates.

Trustix has released advisory TSLSA-2005-0003 to address various issues in multiple products. Please see the referenced advisory for more information.

ALT Linux has released updates dealing with this and other issues. Please see the reference section for more information.


Clam Anti-Virus ClamAV 0.51

Clam Anti-Virus ClamAV 0.52

Clam Anti-Virus ClamAV 0.53

Clam Anti-Virus ClamAV 0.54

Clam Anti-Virus ClamAV 0.60

Clam Anti-Virus ClamAV 0.65

Clam Anti-Virus ClamAV 0.67

Clam Anti-Virus ClamAV 0.68

Clam Anti-Virus ClamAV 0.68 -1

Clam Anti-Virus ClamAV 0.70

Clam Anti-Virus ClamAV 0.80 rc4

Clam Anti-Virus ClamAV 0.80

Clam Anti-Virus ClamAV 0.80 rc3

Clam Anti-Virus ClamAV 0.80 rc1

Clam Anti-Virus ClamAV 0.80 rc2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站