![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.814147 |
Category: | Denial of Service |
Title: | ClamAV < 0.100.2 'unmew11()' DoS Vulnerability - Linux |
Summary: | ClamAV is prone to a denial of service (DoS) vulnerability. |
Description: | Summary: ClamAV is prone to a denial of service (DoS) vulnerability. Vulnerability Insight: The flaw related to the MEW unpacker within the 'unmew11()' function (libclamav/mew.c) can be exploited to trigger an invalid read memory access via a specially crafted EXE file. Vulnerability Impact: Successful exploitation will allow an attacker to cause denial of service. Affected Software/OS: ClamAV versions before 0.100.2. Solution: Update to version 0.100.2 or later. CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-15378 https://security.gentoo.org/glsa/201904-12 https://www.flexera.com/company/secunia-research/advisories/SR-2018-23.html https://lists.debian.org/debian-lts-announce/2018/10/msg00014.html https://secuniaresearch.flexerasoftware.com/advisories/83000/ https://usn.ubuntu.com/3789-1/ https://usn.ubuntu.com/3789-2/ |
Copyright | Copyright (C) 2018 Greenbone Networks GmbH |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |