[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2018-976

ID: oval:org.secpod.oval:def:1600860Date: (C)2018-04-02   (M)2021-12-31
Class: PATCHFamily: unix




Heap-based buffer overflow in mspack/lzxd.cmspack/lzxd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted CHM file. Out-of-bounds access in the PDF parser A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the "DestPos" variable, which allows the attacker to write out of bounds when setting Mem[DestPos]. ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. Stack-based buffer over-read in cabd_read_string functionThe cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2 and other products, allows remote attackers to cause a denial of service via a crafted CAB file

Platform:
Amazon Linux AMI
Product:
clamav
Reference:
ALAS-2018-976
CVE-2017-11423
CVE-2017-6419
CVE-2018-0202
CVE-2012-6706
CVE-2018-1000085
CVE    5
CVE-2012-6706
CVE-2017-11423
CVE-2017-6419
CVE-2018-1000085
...
CPE    2
cpe:/o:amazon:linux
cpe:/a:clamav:clamav

© SecPod Technologies