SB2018042203 - Gentoo update for ClamAV
Published: April 22, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Integer overflow (CVE-ID: CVE-2012-6706)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow when processing .rar archives in unrar 5.5.4. A remote unauthenticated attacker can create a specially crafted archive, trigger memory corruption and execute arbitrary code on the target system.
2) Stack-based buffer over-read (CVE-ID: CVE-2017-11423)
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in the cabd_read_string function due to stack-based buffer over-read. A remote attacker can send a specially crafted CAB file, trick the victim into opening it, trigger memory corruption and cause the service to crash.
3) Out-of-bounds read (CVE-ID: CVE-2017-6418)
The vulnerability allows a rmeote attacker to cause DoS condition on the target system.The weakness exists in libclamav/message.c due to out-of-bounds read. A remote attacker can trick the victim into opening a specially crafted e-mail message, trigger memory corruption and cause the service to crash.
4) Heap-based buffer overflow (CVE-ID: CVE-2017-6419)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.
The weakness exists due to heap-based buffer overflow. A remote attacker can send a specially crafted CHM file, trick the victim into opening it and cause the service to crash or execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
5) Use-after-free error (CVE-ID: CVE-2017-6420)
The vulnerability allows a rmeote attacker to cause DoS condition on the target system.The weakness exists in libclamav/wwunpack.c due to use-after-free error. A remote attacker can trick the victim into opening a specially crafted PE file with WWPack compression, trigger memory corruption and cause the service to crash.
6) Out-of-bounds read (CVE-ID: CVE-2018-0202)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to improper input validation checking mechanisms when handling Portable Document Format files. A remote attacker can send a specially .pdf file, trigger out-of-bounds read and cause the service to crash.
7) Out-of-bounds read (CVE-ID: CVE-2018-1000085)
The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the target system.The weakness exists in the xar_hash_check() function due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted XAR file, trick the victim into opening it, trigger out-of-bounds heap memory read and cause the service to crash.
Remediation
Install update from vendor's website.