Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1000085

Опубликовано: 13 мар. 2018
Источник: debian
EPSS Низкий

Описание

ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
clamavfixed0.99.3~beta1+dfsg-1package
clamavfixed0.99.4+dfsg-1+deb9u1stretchpackage

Примечания

  • https://github.com/Cisco-Talos/clamav-devel/commit/d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6

  • https://www.openwall.com/lists/oss-security/2017/09/29/4

EPSS

Процентиль: 76%
0.00947
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 8 лет назад

ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.

CVSS3: 5.5
nvd
почти 8 лет назад

ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.

CVSS3: 5.5
github
больше 3 лет назад

ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.

suse-cvrf
больше 7 лет назад

Security update for clamav

suse-cvrf
больше 7 лет назад

Security update for clamav

EPSS

Процентиль: 76%
0.00947
Низкий