CVE-2006-1615
CVSS10.0
发布时间 :2006-04-06 18:04:00
修订时间 :2011-09-09 00:00:00
NMCO    

[原文]Multiple format string vulnerabilities in the logging code in Clam AntiVirus (ClamAV) before 0.88.1 might allow remote attackers to execute arbitrary code. NOTE: as of 20060410, it is unclear whether this is a vulnerability, as there is some evidence that the arguments are actually being sanitized properly.


[CNNVD]ClamAV多个安全漏洞(CNNVD-200604-068)

        Clam AntiVirus是Unix的GPL杀毒工具包,很多邮件网关产品都在使用。
        ClamAV中存在多个安全漏洞,可能允许恶意用户导致拒绝服务并入侵系统。
        1) libclamav/pe.c的cli_scanpe()函数的PE首部解析程序存在整数溢出漏洞。攻击者可以通过特制的UPX文件导致堆溢出并执行任意代码。
        成功攻击要求禁用了ArchiveMaxFileSize选项。
        2) shared/output.c中的日志处理时的一些格式串错误可能允许执行任意代码。
        3) ibclamav/others.c的cli_bitset_test()函数中的越界内存访问错误可能导致崩溃。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-134 []

- CPE (受影响的平台与产品)

cpe:/a:clamav:clamav:0.02 ClamAV 0.02
cpe:/a:clamav:clamav:0.86.1 ClamAV 0.86.1
cpe:/a:clamav:clamav:0.3 ClamAV ClamAV 0.3
cpe:/a:clamav:clamav:0.14 ClamAV 0.14
cpe:/a:clamav:clamav:0.84 ClamAV 0.84
cpe:/a:clamav:clamav:0.8:rc3ClamAV 0.80 Release Candidate 3
cpe:/a:clamav:clamav:0.21 ClamAV 0.21
cpe:/a:clamav:clamav:0.86.2 ClamAV 0.86.2
cpe:/a:clamav:clamav:0.70ClamAV 0.70
cpe:/a:clamav:clamav:0.80:rc2 ClamAV 0.80 Release Candidate 2
cpe:/a:clamav:clamav:0.53ClamAV 0.53
cpe:/a:clamav:clamav:0.68ClamAV 0.68
cpe:/a:clamav:clamav:0.68.1 ClamAV 0.68.1
cpe:/a:clamav:clamav:0.14:pre ClamAV 0.14 pre
cpe:/a:clamav:clamav:0.80ClamAV 0.80
cpe:/a:clamav:clamav:0.71 ClamAV 0.71
cpe:/a:clamav:clamav:0.75.1ClamAV 0.75.1
cpe:/a:clamav:clamav:0.13 ClamAV 0.13
cpe:/a:clamav:clamav:0.20ClamAV 0.20
cpe:/a:clamav:clamav:0.80:rc4 ClamAV 0.80 Release Candidate 4
cpe:/a:clamav:clamav:0.54 ClamAV ClamAV 0.54
cpe:/a:clamav:clamav:0.70:rc ClamAV 0.70 Release Candidate
cpe:/a:clamav:clamav:0.86:rc1 ClamAV 0.86 Release Candidate 1
cpe:/a:clamav:clamav:0.10 ClamAV 0.10
cpe:/a:clamav:clamav:0.75 ClamAV 0.75
cpe:/a:clamav:clamav:0.05 ClamAV 0.05
cpe:/a:clamav:clamav:0.80:rc1ClamAV 0.80 Release Candidate 1
cpe:/a:clamav:clamav:0.85ClamAV 0.85
cpe:/a:clamav:clamav:0.51 ClamAV ClamAV 0.51
cpe:/a:clamav:clamav:0.86ClamAV 0.86
cpe:/a:clamav:clamav:0.60pClamAV 0.60p
cpe:/a:clamav:clamav:0.67 ClamAV 0.67
cpe:/a:clamav:clamav:0.12 ClamAV 0.12
cpe:/a:clamav:clamav:0.87.1 ClamAV 0.87.1
cpe:/a:clamav:clamav:0.03 ClamAV 0.03
cpe:/a:clamav:clamav:0.65 ClamAV 0.65
cpe:/a:clamav:clamav:0.67-1 ClamAV ClamAV 0.67-1
cpe:/a:clamav:clamav:0.60 ClamAV 0.60
cpe:/a:clamav:clamav:0.23 ClamAV 0.23
cpe:/a:clamav:clamav:0.80:rc3ClamAV 0.80 Release Candidate 3
cpe:/a:clamav:clamav:0.73 ClamAV 0.73
cpe:/a:clamav:clamav:0.85.1ClamAV 0.85.1
cpe:/a:clamav:clamav:0.74 ClamAV 0.74
cpe:/a:clamav:clamav:0.80:rc ClamAV 0.80 Release Candidate
cpe:/a:clamav:clamav:0.15 ClamAV 0.15
cpe:/a:clamav:clamav:0.84:rc1ClamAV 0.84 Release Candidate 1
cpe:/a:clamav:clamav:0.22ClamAV 0.22
cpe:/a:clamav:clamav:0.01 ClamAV 0.01
cpe:/a:clamav:clamav:0.81 ClamAV 0.81
cpe:/a:clamav:clamav:0.84:rc2 ClamAV 0.84 Release Candidate 2
cpe:/a:clamav:clamav:0.72 ClamAV 0.72
cpe:/a:clamav:clamav:0.81:rc1ClamAV 0.81 Release Candidate 1
cpe:/a:clamav:clamav:0.66 ClamAV ClamAV 0.66
cpe:/a:clamav:clamav:0.24 ClamAV 0.24
cpe:/a:clamav:clamav:0.52 ClamAV 0.52
cpe:/a:clamav:clamav:0.82 ClamAV 0.82
cpe:/a:clamav:clamav:0.88ClamAV 0.88
cpe:/a:clamav:clamav:0.87ClamAV 0.87
cpe:/a:clamav:clamav:0.83ClamAV 0.83

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1615
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1615
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200604-068
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA06-132A.html
(UNKNOWN)  CERT  TA06-132A
http://www.securityfocus.com/bid/17388
(PATCH)  BID  17388
http://www.gentoo.org/security/en/glsa/glsa-200604-06.xml
(VENDOR_ADVISORY)  GENTOO  GLSA-200604-06
http://www.debian.org/security/2006/dsa-1024
(VENDOR_ADVISORY)  DEBIAN  DSA-1024
http://sourceforge.net/project/shownotes.php?release_id=407078&group_id=86638
(PATCH)  CONFIRM  http://sourceforge.net/project/shownotes.php?release_id=407078&group_id=86638
http://secunia.com/advisories/19608
(VENDOR_ADVISORY)  SECUNIA  19608
http://secunia.com/advisories/19570
(VENDOR_ADVISORY)  SECUNIA  19570
http://secunia.com/advisories/19564
(VENDOR_ADVISORY)  SECUNIA  19564
http://secunia.com/advisories/19536
(VENDOR_ADVISORY)  SECUNIA  19536
http://secunia.com/advisories/19534
(VENDOR_ADVISORY)  SECUNIA  19534
http://lists.suse.com/archive/suse-security-announce/2006-Apr/0002.html
(VENDOR_ADVISORY)  SUSE  SUSE-SA:2006:020
http://xforce.iss.net/xforce/xfdb/25661
(UNKNOWN)  XF  clamav-output-format-string(25661)
http://www.vupen.com/english/advisories/2006/1779
(VENDOR_ADVISORY)  VUPEN  ADV-2006-1779
http://www.vupen.com/english/advisories/2006/1258
(VENDOR_ADVISORY)  VUPEN  ADV-2006-1258
http://www.trustix.org/errata/2006/0020
(UNKNOWN)  TRUSTIX  2006-0020
http://www.securityfocus.com/bid/17951
(UNKNOWN)  BID  17951
http://www.osvdb.org/24458
(UNKNOWN)  OSVDB  24458
http://www.mandriva.com/security/advisories?name=MDKSA-2006:067
(UNKNOWN)  MANDRIVA  MDKSA-2006:067
http://up2date.astaro.com/2006/05/low_up2date_6202.html
(UNKNOWN)  CONFIRM  http://up2date.astaro.com/2006/05/low_up2date_6202.html
http://secunia.com/advisories/23719
(VENDOR_ADVISORY)  SECUNIA  23719
http://secunia.com/advisories/20077
(VENDOR_ADVISORY)  SECUNIA  20077
http://secunia.com/advisories/19567
(VENDOR_ADVISORY)  SECUNIA  19567
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
(UNKNOWN)  APPLE  APPLE-SA-2006-05-11

- 漏洞信息

ClamAV多个安全漏洞
危急 格式化字符串
2006-04-06 00:00:00 2006-04-24 00:00:00
远程  
        Clam AntiVirus是Unix的GPL杀毒工具包,很多邮件网关产品都在使用。
        ClamAV中存在多个安全漏洞,可能允许恶意用户导致拒绝服务并入侵系统。
        1) libclamav/pe.c的cli_scanpe()函数的PE首部解析程序存在整数溢出漏洞。攻击者可以通过特制的UPX文件导致堆溢出并执行任意代码。
        成功攻击要求禁用了ArchiveMaxFileSize选项。
        2) shared/output.c中的日志处理时的一些格式串错误可能允许执行任意代码。
        3) ibclamav/others.c的cli_bitset_test()函数中的越界内存访问错误可能导致崩溃。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Clam Anti-Virus ClamAV 0.51
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.52
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.53
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.54
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.60
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.65
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.67
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        SuSE clamav-0.88.1-0.4.i586.rpm
        SUSE LINUX 9.1:
        ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/clamav-0.88.1-0.4 .i586.rpm
        SuSE clamav-0.88.1-0.4.x86_64.rpm
        SUSE LINUX 9.1:
        ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/clamav-0.88.1 -0.4.x86_64.rpm
        Clam Anti-Virus ClamAV 0.68
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.68 -1
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.70
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.75.1
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.80 rc4
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.80
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.80 rc3
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        SuSE clamav-0.88.1-0.2.i586.rpm
        SUSE LINUX 9.2:
        ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/clamav-0.88.1-0.2 .i586.rpm
        SuSE clamav-0.88.1-0.2.x86_64.rpm
        SUSE LINUX 9.2:
        ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/clamav-0.88.1-0 .2.x86_64.rpm
        Clam Anti-Virus ClamAV 0.80 rc1
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.80 rc2
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.81
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.82
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Clam Anti-Virus ClamAV 0.83
        Clam Anti-Virus clamav-0.88.1.tar.gz
        http://prdownloads.sourceforge.net/clamav/clamav-0.88.1.tar.gz
        Mandriva clamav-0.88.1-0.1.102mdk.i586.rpm
        Mandriva Linux 10.2:
        http://www.mandriva.com/en/download
        Mandriva clamav-0.88.1-0.1.102mdk.src.rpm
        Mandriva Linux 10.2:
        http://www.mandriva.com/en/download
        Mandriva clamav-0.88.1-0.1.102mdk.x86_64.rpm
        Mandriva Linux 10.2:
        http://www.mandriva.com/en/download
        Mandriva clamav-db-0.88.1-0.1.102mdk.i586.rpm
        Mandriva Linux 10.2:
        http://www.mandriva.com/en/download
        Mandriva clamav-db-0.88.1-0.1.102mdk.x86_64.rpm
        Mandriva Linux 10.2:
        http://www.mandriva.com/en/download
        Mandriva clamav-milter-0.88.1-0.1.102mdk.i586.rpm
        Mandriva Linux 10.2:
        http://www.mandriva.com/en/download
        Mandriva clamav-milter-0.88.1-0.1.102mdk.x86_64.rpm
        Mandriva Linux 10.2:
        http://www.mandriva.com/en/download
        Mandriva clamd-0.88.1-0.1.102mdk.i586.rpm
        Mandriva Linux 10.2:
        http://www.mandriva.com/en/download
        Mandriva clamd-0.88.1-0.1.102mdk.x86_64.rpm
        Mandriva Linux 10.2:
        http://www.mandriva.com/en/download
        Mandriva l

- 漏洞信息

24458
Clam AntiVirus Logging Code Format String
Local / Remote, Context Dependent Input Manipulation
Loss of Integrity Upgrade
Exploit Unknown Vendor Verified

- 漏洞描述

A remote format string vulnerability exists in Clam Anti-Virus. The logging routines in shared/output.c fail to correctly validate user-supplied input. With a specially crafted transaction including format strings, an attacker can cause arbitrary code execution, resulting in a loss of integrity.

- 时间线

2006-04-05 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 0.88.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站