ClamAV Scanning Bypass and Memory Corruption Vulnerability
RISK: Medium Risk
A vulnerability has been identified in ClamAV, which can be exploited by malicious people to bypass the scanning functionality or potentially compromise a vulnerable system.
1. Due to an error when processing archives can be exploited to bypass the anti-virus scanning functionality via specially crafted CAB files.
2. Due to an error exists within the "qtm_decompress()" function in libclamav/mspack.c. This can be exploited to cause a memory corruption when a specially crafted Quantum-compressed file is scanned.
Impact
- Remote Code Execution
System / Technologies affected
- Clam AntiVirus (clamav) 0.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 0.96.
- http://www.clamav.net/lang/en/download/
Vulnerability Identifier
Source
Related Link
Share with