CVE-2018-1000085

NameCVE-2018-1000085
DescriptionClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1307-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
clamav (PTS)jessie, jessie (lts)0.103.12+dfsg-0+deb8u1fixed
stretch (security)0.103.6+dfsg-0+deb9u1fixed
stretch (lts), stretch0.103.12+dfsg-0+deb9u1fixed
buster, buster (lts)1.0.7+dfsg-1~deb10u1fixed
buster (security)0.103.9+dfsg-0+deb10u1fixed
bullseye0.103.10+dfsg-0+deb11u1fixed
bullseye (security)1.0.7+dfsg-1~deb11u2fixed
bookworm1.0.7+dfsg-1~deb12u1fixed
sid, trixie1.4.1+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
clamavsourcewheezy0.99.4+dfsg-1+deb7u1DLA-1307-1
clamavsourcestretch0.99.4+dfsg-1+deb9u1
clamavsource(unstable)0.99.3~beta1+dfsg-1

Notes

https://github.com/Cisco-Talos/clamav-devel/commit/d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6
https://www.openwall.com/lists/oss-security/2017/09/29/4

Search for package or bug name: Reporting problems