Name | CVE-2005-3229 |
Description | Multiple interpretation error in unspecified versions of ClamAV Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
clamav (PTS) | jessie, jessie (lts) | 0.103.9+dfsg-0+deb8u1 | fixed |
| stretch (security) | 0.103.6+dfsg-0+deb9u1 | fixed |
| stretch (lts), stretch | 0.103.9+dfsg-0+deb9u1 | fixed |
| buster (security), buster, buster (lts) | 0.103.9+dfsg-0+deb10u1 | fixed |
| bullseye | 0.103.10+dfsg-0+deb11u1 | fixed |
| bookworm | 1.0.7+dfsg-1~deb12u1 | fixed |
| sid, trixie | 1.4.1+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
clamav | source | (unstable) | (not affected) | | | |
Notes
- clamav <not-affected> (predates any supported Debian release)
Should rather be fixed in the buggy (fringe, proprietary) RAR unpackers