製品・ソフトウェアに関する情報
ClamAV の pe.c における整数アンダーフローの脆弱性
Title ClamAV の pe.c における整数アンダーフローの脆弱性
Summary

ClamAV の pe.c の cli_scanpe 関数には、整数アンダーフローの脆弱性が存在します。

Possible impacts 第三者により、UPX でパックされた実行ファイル内の PE セクションのサイズよりも大きい偏ったオフセットにより、外部領域への読み込み (out-of-bounds read) を誘発され、運用妨害 (クラッシュ) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date April 23, 2013, midnight
Registration Date May 15, 2013, 4:59 p.m.
Last Update Oct. 9, 2013, 2:16 p.m.
CVSS2.0 : 警告
Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Affected System
アップル
Apple Mac OS X v10.6.8
Apple Mac OS X v10.7.5
Apple Mac OS X Server v10.6.8
Apple Mac OS X Server v10.7.5
macOS Server (旧 OS X Server) v2.2.2 未満 (Apple Mac OS X v10.8 以降)
Canonical
Ubuntu 10.04 LTS
Ubuntu 11.10
Ubuntu 12.04 LTS
Ubuntu 12.10
Ubuntu 13.04
ClamAV
ClamAV 0.97.8 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2013年05月15日]
  掲載
[2013年07月05日]
  ベンダ情報:openSUSE (openSUSE-SU-2013:0883) を追加
  ベンダ情報:openSUSE (openSUSE-SU-2013:0881) を追加
[2013年10月09日]
  影響を受けるシステム:アップル (HT5880) の情報を追加
  影響を受けるシステム:アップル (HT5892) の情報を追加
  ベンダ情報:アップル (HT5880) を追加
  ベンダ情報:アップル (HT5892) を追加
  ベンダ情報:アップル (APPLE-SA-2013-09-17-1) を追加
  ベンダ情報:アップル (APPLE-SA-2013-09-12-1) を追加
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2013-2020
Summary

Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read.

Publication Date May 14, 2013, 8:55 a.m.
Registration Date Jan. 26, 2021, 3:37 p.m.
Last Update Nov. 21, 2024, 10:50 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:o:suse:linux_enterprise_server:11.0:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:a:clamav:clamav:0.95.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.92:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.92_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.97:rc:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91.2_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.93.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.97.5:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc1.1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.93:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.93.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.94:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95:src2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.94.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95:src1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.1_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.3_p1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.97.4:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90:rc3:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.3_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.2_p0:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96.5:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.97.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91:rc2:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:* 0.97.7
cpe:2.3:a:clamav:clamav:0.97.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.96:rc1:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.95.3:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.97:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.92.1:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.97.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.93.2:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:0.94.1:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List