发布时间 :2005-08-03 00:00:00
修订时间 :2017-07-10 21:32:51

[原文]Multiple integer overflows in the (1) TNEF, (2) CHM, or (3) FSG file format processors in libclamav for Clam AntiVirus (ClamAV) 0.86.1 and earlier allow remote attackers to gain privileges via a crafted e-mail message.

[CNNVD]ClamAV 多个整数溢出漏洞(CNNVD-200508-009)

        Clam AntiVirus是Unix的GPL杀毒工具包,很多邮件网关产品都在使用。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20050725 ClamAV Multiple Rem0te Buffer Overflows
(UNKNOWN)  BID  14359
(UNKNOWN)  XF  clam-antivirus-file-format-gain-access(21555)

- 漏洞信息

ClamAV 多个整数溢出漏洞
高危 缓冲区溢出
2005-08-03 00:00:00 2005-10-20 00:00:00
        Clam AntiVirus是Unix的GPL杀毒工具包,很多邮件网关产品都在使用。

- 公告与补丁


- 漏洞信息 (F39434)

Debian Linux Security Advisory 776-1 (PacketStormID:F39434)
2005-08-17 00:00:00

Debian Security Advisory DSA 776-1 - Neel Mehta and Alex Wheeler discovered that Clam AntiVirus is vulnerable to integer overflows when handling the TNEF, CHM and FSG file formats.

Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 776-1                                        Martin Schulze
August 16th, 2005              
- --------------------------------------------------------------------------

Package        : clamav
Vulnerability  : integer overflows, infinete loop
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2005-2450
BugTraq ID     : 14359

Several bugs were discovered in Clam AntiVirus, the antivirus scanner
for Unix, designed for integration with mail servers to perform
attachment scanning.  The following problems were identified:


    Neel Mehta and Alex Wheeler discovered that Clam AntiVirus is
    vulnerable to integer overflows when handling the TNEF, CHM and
    FSG file formats.


    Mark Pizzolato fixed a possible infinete loop that could cause a
    denial of service.

The old stable distribution (woody) is not affected as it doesn't contain clamav.

For the stable distribution (sarge) these problems have been fixed in
version 0.84-2.sarge.2.

For the unstable distribution (sid) these problems have been fixed in
version 0.86.2-1.

We recommend that you upgrade your clamav package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:      872 a5d90ac557b114453e0935d95bca8e17
      Size/MD5 checksum:   169363 b12ac60c0652f68db9116aad830cde7f
      Size/MD5 checksum:  4006624 c43213da01d510faf117daa9a4d5326c

  Architecture independent components:
      Size/MD5 checksum:   154106 03b1f4f5addba27a157b0a6676555ff8
      Size/MD5 checksum:   689748 84683f319f4c9a8f7e4d1d77d747396c
      Size/MD5 checksum:   123118 58fea3ad4fcc2611f69af0f2ba455af8

  Alpha architecture:
      Size/MD5 checksum:    74676 3f1d00637a7028c7012c3fe51e1383f4
      Size/MD5 checksum:    48782 937bbc75d644b6c7a2e0ec7b5daa5bf6
      Size/MD5 checksum:  2176324 0e6a0ae9d5ec4b68ed0e8bc688bbfb68
      Size/MD5 checksum:    42116 bdc3ae3b34c0a9be2eb8621cc3177676
      Size/MD5 checksum:   254548 5db908c37914f6fd06b2f3d689de0b81
      Size/MD5 checksum:   283680 1e88b3d96000f0a1c5cf8a2cd0aad493

  AMD64 architecture:
      Size/MD5 checksum:    68866 07f764af8962cda289e92a0f7ca2d81a
      Size/MD5 checksum:    44182 8d7dbb6148610b78c81ce135dbf9c7f8
      Size/MD5 checksum:  2173198 615c7b237d3a4993550955e00e605135
      Size/MD5 checksum:    40010 6941c36e7db2e48dc78f0a97e1b83aed
      Size/MD5 checksum:   175358 ce3229e6277efe07443593432d194e8b
      Size/MD5 checksum:   257690 c590d1a69e5899e75ef907d55ee2510a

  ARM architecture:
      Size/MD5 checksum:    63820 5871903c9f4789757ca2dda256a29197
      Size/MD5 checksum:    39504 bb7f439e8c7e0c7345ac37e537bb1db1
      Size/MD5 checksum:  2171180 a13279483c8265842b3b1e8641814fd5
      Size/MD5 checksum:    37302 b1400e02bbf2889e0befd15012ca1699
      Size/MD5 checksum:   173514 a063023f5ad8e3d21896f21782f05be7
      Size/MD5 checksum:   248174 7e084d71255c9924a90ab7956ae55ff7

  Intel IA-32 architecture:
      Size/MD5 checksum:    65140 ecebd43707069c8ef8f5ba3c4e007d23
      Size/MD5 checksum:    40202 d9ab0e02273c9fff0d4f73ed3ec73215
      Size/MD5 checksum:  2171494 d2fc4550ac66059e286497b2b9c17ffe
      Size/MD5 checksum:    38024 65657d68687180b74819de783d0098b4
      Size/MD5 checksum:   158552 e8143195d0a7d26a282a13a8a298e263
      Size/MD5 checksum:   252400 3c2b9d3e379c0c5763f7d8a4162ac1a6

  Intel IA-64 architecture:
      Size/MD5 checksum:    81732 b010b8ca29e256a80f43fabd673f9d26
      Size/MD5 checksum:    55098 e9ede8cecf6440b9c18620c82ed017f4
      Size/MD5 checksum:  2180096 ae09fef9a1569fe07f77209e1e3bda70
      Size/MD5 checksum:    49202 db0e453890631c462b76c79526034afb
      Size/MD5 checksum:   250438 430797b7c58289c263aa0b3e0b4dbc7f
      Size/MD5 checksum:   315662 3261606911205a42adaa885a4cce1b0e

  HP Precision architecture:
      Size/MD5 checksum:    68188 28b4f3e57c32ff42e1609de48f5a4e44
      Size/MD5 checksum:    43232 0204bc7cb2dc0e22b0de6fcac5d7d56d
      Size/MD5 checksum:  2173632 bce3329a057c47e0e5d237fab515ae23
      Size/MD5 checksum:    39456 6c75ce7b7ea86db1e0c6da64da1f95ff
      Size/MD5 checksum:   201268 e101e3b0ff335ee434bc79744d28dae3
      Size/MD5 checksum:   281626 689202601c916ae9e2da20e7bca6c7a3

  Motorola 680x0 architecture:
      Size/MD5 checksum:    62454 ff013452d8ad7bc594236ad4612e7314
      Size/MD5 checksum:    38070 0a20559664e319e5f8877d2122fa149d
      Size/MD5 checksum:  2170456 b2cc40301a092d987de075c37fc4f271
      Size/MD5 checksum:    35066 5b7b62906971f1f06d1e8006598de8ca
      Size/MD5 checksum:   145404 47f7a24305acd5201509e3f1d2ca4ceb
      Size/MD5 checksum:   248852 21681bb560a4036cc8550cf128e0c8f7

  Big endian MIPS architecture:
      Size/MD5 checksum:    67862 97a3b0443ee81ea46597039bbe2dc182
      Size/MD5 checksum:    43678 f6a8c79489fb6ba605b57058b72226da
      Size/MD5 checksum:  2172976 2969543db5ee78197b4b836c9d78d371
      Size/MD5 checksum:    37676 a4a7297f5e3fc3bfc1492bd26f97a788
      Size/MD5 checksum:   194322 cc37bcbd31388e6f562c54e142d13ac0
      Size/MD5 checksum:   255894 3ea583ce7f2505142e194b703d1ca942

  Little endian MIPS architecture:
      Size/MD5 checksum:    67488 a21ff89942ffbadfa4e689cdb1909866
      Size/MD5 checksum:    43488 01e504336acf95fcc1b0ee8944f4878a
      Size/MD5 checksum:  2172936 02a85640ed6e25f8941bee026350e243
      Size/MD5 checksum:    37962 6ea7d7fdf1107411c7dbde7c1a42653b
      Size/MD5 checksum:   190668 b889c22d131758864a4879b5cb7348ec
      Size/MD5 checksum:   253402 f574c054c397f0260667e745775815cc

  PowerPC architecture:
      Size/MD5 checksum:    69232 c93efea8ad9bfc150702ab8ff3263bf5
      Size/MD5 checksum:    44574 89e9935711c574c4034626d865908f8e
      Size/MD5 checksum:  2173542 48fe9cda367a7cc27f92d85d92b41039
      Size/MD5 checksum:    38874 8a2bb630dbb823a6ff17215e1f0af758
      Size/MD5 checksum:   186630 bdc7b36545911ed04ec782d58b227efb
      Size/MD5 checksum:   263034 66b57b4acafa6e429c02794885c48e60

  IBM S/390 architecture:
      Size/MD5 checksum:    67778 590e6c18c9d02596f49d64b4611eb54e
      Size/MD5 checksum:    43430 c096db0fd3865f26623d7885effd6751
      Size/MD5 checksum:  2172874 7fc9489259f2e4fb14b34322f191b79c
      Size/MD5 checksum:    38944 25af940b6ce231410cc82c4a818e0f5b
      Size/MD5 checksum:   181600 80fb485a2ef322a9b2e42b261688e4d7
      Size/MD5 checksum:   267588 d194c77d7317c1b716ff44edaf6ccb65

  Sun Sparc architecture:
      Size/MD5 checksum:    64324 a26a1f0208c60f37a85ff6e120dab86c
      Size/MD5 checksum:    39392 bc8760a6e2ae4737260682f513242afd
      Size/MD5 checksum:  2171058 47adaeb9cfab1857a6d24476e5bd792b
      Size/MD5 checksum:    36854 356607cd1e092378da0471c6dd6fcfa1
      Size/MD5 checksum:   174914 be5710250858efd4181ac13f9febd723
      Size/MD5 checksum:   263320 828259b0260780173ffd0514b39fe0ba

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show <pkg>' and<pkg>

Version: GnuPG v1.4.1 (GNU/Linux)



- 漏洞信息

Clam AntiVirus TNEF File Processing Multiple Overflows
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Unknown Vendor Verified

- 漏洞描述

A remote overflow exists in Clam AntiVirus. Clam AntiVirus fails to perform adequate boundary check in libclamav/tnef.c, resulting in a heap overflow. With a specially crafted request, an attacker can gain privileges equal to those of the Clam AntiVirus process, possibly allowing for a remote system compromise.

- 时间线

2005-07-24 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 0.86.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者