what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

iDEFENSE Security Advisory 2007-02-15.2

iDEFENSE Security Advisory 2007-02-15.2
Posted Feb 16, 2007
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 02.15.07 - Remote exploitation of a directory traversal vulnerability in Clam AntiVirus' ClamAV allows attackers to overwrite files owned by the clamd scanner. The vulnerability specifically exists due to the lack of validation of the id parameter string taken from a MIME header. When parsing a multi-part message clam takes this string from the header and uses it to create a local file. By sending a string such as "../../../../some/file" an attacker can create or overwrite an arbitrary file owned by the clamd process. Data from the message body is later written to this file. iDefense has confirmed this vulnerability affects Clam AntiVirus ClamAV version 0.88.6. All versions prior to the 0.90 stable release are suspected to be vulnerable.

tags | advisory, remote, arbitrary, local
advisories | CVE-2007-0898
SHA-256 | 5e80d8dac7b01be02d9ccc923cedb221feb90232b18090dbf18218c30624b0cc

iDEFENSE Security Advisory 2007-02-15.2

Change Mirror Download
Multiple Vendor ClamAV MIME Parsing Directory Traversal Vulnerability

iDefense Security Advisory 02.15.07
http://labs.idefense.com/intelligence/vulnerabilities/
Feb 15, 2007

I. BACKGROUND

Clam AntiVirus is a multi-platform GPL anti-virus toolkit. ClamAV is often
integrated into mail gateways, and used to scan mail traffic for viruses.
More information about ClamAV is available from http://clamav.net/.
Multipurpose Internet Mail Extensions (MIME), is an internet standard for
sending email with non-text attachments, multi-part message bodies, and
non-ASCII character sets.

II. DESCRIPTION

Remote exploitation of a directory traversal vulnerability in Clam
AntiVirus' ClamAV allows attackers to overwrite files owned by the clamd
scanner.

The vulnerability specifically exists due to the lack of validation of the
id parameter string taken from a MIME header. When parsing a multi-part
message clam takes this string from the header and uses it to create a
local file. By sending a string such as "../../../../some/file" an
attacker can create or overwrite an arbitrary file owned by the clamd
process. Data from the message body is later written to this file.

III. ANALYSIS

Exploitation allows attackers to degrade the service of the ClamAV virus
scanning service. The most important mitigating factor is that the clam
process runs with the privileges of the clamav user and group. This group
has access to a limited subset of files on the host. A possible target for
overwriting is the virus database file. By overwriting this file an
attacker could then send a virus through the gateway without clam
recognizing it; this effectively denies service. Arbitrary viruses will be
allowed to pass through, creating a false sense of security.

IV. DETECTION

iDefense has confirmed this vulnerability affects Clam AntiVirus ClamAV
v0.88.6. All versions prior to the 0.90 stable release are suspected to be
vulnerable.

V. WORKAROUND

iDefense is unaware of any effective workarounds for this issue.

VI. VENDOR RESPONSE

Clam AntiVirus has addressed this vulnerability in the version 0.90 stable
release.

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2007-0898 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

02/07/2007 Initial vendor notification
02/13/2007 Initial vendor response
02/15/2007 Coordinated public disclosure

IX. CREDIT

The discoverer of this vulnerability wishes to remain anonymous.

Get paid for vulnerability research
http://labs.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events
http://labs.idefense.com/

X. LEGAL NOTICES

Copyright © 2006 iDefense, Inc.

Permission is granted for the redistribution of this alert electronically.
It may not be edited in any way without the express written consent of
iDefense. If you wish to reprint the whole or any part of this alert in
any other medium other than electronically, please e-mail
customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate at
the time of publishing based on currently available information. Use of
the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on, this
information.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close