First published: Wed Apr 16 2008(Updated: )
The rfc2231 function in message.c in libclamav in ClamAV before 0.93 allows remote attackers to cause a denial of service (crash) via a crafted message that produces a string that is not null terminated, which triggers a buffer over-read.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ClamXAV | =0.92 | |
ClamXAV | =0.90rc1 | |
ClamXAV | =0.90.1 | |
ClamXAV | =0.91 | |
ClamXAV | =0.90 | |
ClamXAV | =0.90_rc1.1 | |
ClamXAV | =0.90_rc2 | |
ClamXAV | =0.90_rc3 | |
ClamAV | =0.90 | |
ClamAV | =0.90.1 | |
ClamAV | =0.90_rc1.1 | |
ClamAV | =0.90_rc2 | |
ClamAV | =0.90_rc3 | |
ClamAV | =0.90rc1 | |
ClamAV | =0.91 | |
ClamAV | =0.92 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1836 has a severity rating that indicates it can lead to a denial of service due to a buffer over-read.
CVE-2008-1836 affects ClamAV versions 0.90 through 0.92, including release candidates.
To fix CVE-2008-1836, upgrade ClamAV to version 0.93 or later.
CVE-2008-1836 can cause a denial of service, resulting in the affected application crashing.
Yes, CVE-2008-1836 can be exploited remotely by attackers using crafted messages.