CVE-2018-1000085

NameCVE-2018-1000085
DescriptionClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1307-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
clamav (PTS)jessie0.100.0+dfsg-0+deb8u1fixed
jessie (security)0.100.2+dfsg-0+deb8u1fixed
stretch0.100.2+dfsg-0+deb9u1fixed
buster, sid0.100.2+dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
clamavsource(unstable)0.99.3~beta1+dfsg-1medium
clamavsourcestretch0.99.4+dfsg-1+deb9u1medium
clamavsourcewheezy0.99.4+dfsg-1+deb7u1mediumDLA-1307-1

Notes

https://github.com/Cisco-Talos/clamav-devel/commit/d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6
http://www.openwall.com/lists/oss-security/2017/09/29/4

Search for package or bug name: Reporting problems