First published: Thu Jun 30 2005(Updated: )
The ENSURE_BITS macro in mszipd.c for Clam AntiVirus (ClamAV) 0.83, and other versions vefore 0.86, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a cabinet (CAB) file with the cffile_FolderOffset field set to 0xff, which causes a zero-length read.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ClamAV | =0.83 | |
ClamAV | =0.84_rc1 | |
ClamAV | =0.84_rc2 | |
ClamAV | =0.85 | |
ClamAV | =0.85.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1923 is classified as a denial of service vulnerability due to CPU consumption caused by an infinite loop.
To fix CVE-2005-1923, upgrade ClamAV to version 0.86 or later.
CVE-2005-1923 affects ClamAV versions 0.83, 0.84_rc1, 0.84_rc2, 0.85, and 0.85.1.
Yes, CVE-2005-1923 can be exploited remotely by sending a specially crafted CAB file.
The impact of CVE-2005-1923 is significant as it leads to high CPU consumption potentially causing system unresponsiveness.