4.3
CVSSv2

CVE-2018-1000085

Published: 13/03/2018 Updated: 20/03/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.

Vulnerable Product Search on Vulmon Subscribe to Product

clamav clamav 0.99.3

debian debian linux 7.0

canonical ubuntu linux 14.04

canonical ubuntu linux 17.10

canonical ubuntu linux 12.04

canonical ubuntu linux 16.04

Vendor Advisories

Several security issues were fixed in ClamAV ...
Several security issues were fixed in ClamAV ...
Heap-based buffer overflow in mspack/lzxdcmspack/lzxdc in libmspack 05alpha, as used in ClamAV 0992, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted CHM file (CVE-2017-6419) Out-of-bounds access in the PDF parser (CVE-2018-0202) A V ...
A heap-based out-of-bounds read has been found in the xar_hash_check function of the xar decoder of ClamAV before 0994, leading to a denial of service ...