First published: Wed Apr 16 2008(Updated: )
ClamAV before 0.93 allows remote attackers to cause a denial of service (CPU consumption) via a crafted ARJ archive, as demonstrated by the PROTOS GENOME test suite for Archive Formats.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ClamXAV | =0.92 | |
ClamXAV | =0.90rc1 | |
ClamXAV | =0.90.1 | |
ClamXAV | =0.91 | |
ClamXAV | =0.90 | |
ClamXAV | =0.90_rc1.1 | |
ClamXAV | =0.90_rc2 | |
ClamXAV | =0.90_rc3 | |
ClamAV | =0.90 | |
ClamAV | =0.90.1 | |
ClamAV | =0.90_rc1.1 | |
ClamAV | =0.90_rc2 | |
ClamAV | =0.90_rc3 | |
ClamAV | =0.90rc1 | |
ClamAV | =0.91 | |
ClamAV | =0.92 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1387 has a medium severity rating due to its potential to cause denial of service by consuming excessive CPU resources.
To fix CVE-2008-1387, upgrade ClamAV to version 0.93 or later, where the vulnerability has been addressed.
CVE-2008-1387 specifically affects crafted ARJ archive files.
Yes, CVE-2008-1387 can be easily exploited by sending a specially crafted ARJ archive to a vulnerable version of ClamAV.
CVE-2008-1387 affects ClamAV versions prior to 0.93, including 0.90 through 0.92.