SMTP: ClamAV UPX File Handling Heap Overflow

This signature detects attempts to exploit a known vulnerability agains Clam Anti-Virus. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

ClamAV is prone to a heap buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. This issue occurs when the application attempts to handle compressed UPX files. Exploiting this issue could allow attacker-supplied machine code to execute in the context of the affected application. The issue would occur when the malformed file is scanned manually or automatically in deployments such as email gateways. ClamAV versions 0.88.2 and 0.88.3 are vulnerable to this issue; prior versions may also be affected.

Affected Products

Suse linux_professional

References

CVE: CVE-2006-4018

Short Name
SMTP:OVERFLOW:CLAMAV-UPX-OF
Severity
Major
Recommended
False
Recommended Action
None
Category
SMTP
Keywords
CVE-2006-4018 ClamAV File Handling Heap Overflow UPX
Release Date
09/15/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Suse

Trustix

Gentoo

Clam_anti-virus

Mandriva

Debian

CVSS Score

7.5

Found a potential security threat?