DescriptionA vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
clamav (PTS)stretch0.102.3+dfsg-0~deb9u1fixed
stretch (security)0.103.6+dfsg-0+deb9u1fixed
bookworm, sid0.103.6+dfsg-1fixed
libclamunrar (PTS)stretch/non-free0.102.3-0+deb9u1fixed
bookworm/non-free, sid/non-free, bullseye/non-free0.102.3-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
clamavsourcejessie(not affected)
clamavsourcestretch(not affected)
libclamunrarsourcejessie(not affected)
libclamunrarsourcestretch(not affected)


[stretch] - libclamunrar <not-affected> (Vulnerable code only present in 0.101.1 and 0.101.0)
[jessie] - libclamunrar <not-affected> (Vulnerable code introduced later)
[stretch] - clamav <not-affected> (Vulnerable code only present in 0.101.1 and 0.101.0)
[jessie] - clamav <not-affected> (Vulnerable code introduced later)

Search for package or bug name: Reporting problems