Vulnerability Name:
CVE-2004-1876 (CCN-15692)
Assigned:
2004-03-30
Published:
2004-03-30
Updated:
2017-07-11
Summary:
The "%f" feature in the VirusEvent directive in Clam AntiVirus daemon (clamd) before 0.70 allows local users to execute arbitrary commands via shell metacharacters in a file name.
CVSS v3 Severity:
5.9 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
Low
Integrity (I):
Low
Availibility (A):
Low
CVSS v2 Severity:
4.6 Medium
(CVSS v2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
4.6 Medium
(CCN CVSS v2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
Vulnerability Type:
CWE-Other
Vulnerability Consequences:
Gain Privileges
References:
Source: CCN
Type: BugTraq Mailing List, Tue Mar 30 2004 - 06:34:18 CST
clamd - NEVER use "%f" in your "VirusEvent"
Source: MITRE
Type: CNA
CVE-2004-1876
Source: BUGTRAQ
Type: UNKNOWN
20040330 clamd - NEVER use "%f" in your "VirusEvent"
Source: CCN
Type: SA11253
Clam AntiVirus Realtime Scanning VirusEvent Security Issue
Source: SECUNIA
Type: Patch, Vendor Advisory
11253
Source: GENTOO
Type: Patch, Vendor Advisory
GLSA-200405-03
Source: CCN
Type: GLSA-200405-03
ClamAV VirusEvent parameter vulnerability
Source: CCN
Type: GLSA 200405-03
ClamAV VirusEvent parameter vulnerability
Source: CCN
Type: OSVDB ID: 4759
Clam AntiVirus Realtime Scanning VirusEvent Local Arbitrary Command Execution
Source: BID
Type: Exploit, Patch, Vendor Advisory
10007
Source: CCN
Type: BID-10007
Clam Anti-Virus ClamAV Arbitrary Command Execution Vulnerability
Source: CCN
Type: BID-10008
MPlayer Remote HTTP Header Buffer Overflow Vulnerability
Source: CCN
Type: BID-10009
Oracle Single Sign-On Login Page Authentication Credential Disclosure Vulnerability
Source: CCN
Type: BID-1001
InterAccess TelnetD Server 4.0 Terminal Configuration Vulnerability
Source: CCN
Type: BID-10010
LinBit Technologies LINBOX Officeserver Remote Authentication Bypass Vulnerability
Source: CCN
Type: BID-10013
PHPKit Multiple HTML Injection Vulnerabilities
Source: CCN
Type: BID-10017
JamesOff QuoteEngine Multiple Parameter Unspecified SQL Injection Vulnerability
Source: CCN
Type: BID-10018
MadBMS Unspecified Login Vulnerability
Source: CCN
Type: BID-10019
Cactusoft CactuShop SQL Injection Vulnerability
Source: CCN
Type: BID-1002
Sambar Server Batch CGI Vulnerability
Source: CCN
Type: BID-10020
CactuSoft CactuShop Cross-Site Scripting Vulnerability
Source: CCN
Type: BID-10022
Roger Wilco Server UDP Datagram Handling Denial Of Service Vulnerability
Source: CCN
Type: BID-10024
Roger Wilco Information Disclosure Vulnerability
Source: CCN
Type: BID-10025
Roger Wilco Server Unauthorized Audio Stream Denial Of Service Vulnerability
Source: CCN
Type: BID-10026
ADA IMGSVR Remote Directory Listing Vulnerability
Source: CCN
Type: BID-10027
ADA IMGSVR Remote File Download Vulnerability
Source: CCN
Type: BID-10028
OpenBSD ISAKMPD Zero Payload Length Denial Of Service Vulnerability
Source: CCN
Type: BID-1003
FTPx FTP Explorer Weak Password Encryption Vulnerability
Source: CCN
Type: BID-10033
HAHTsite Scenario Server Project File Name Buffer Overrun Vulnerability
Source: CCN
Type: BID-10036
Macromedia Dreamweaver Remote User Database Access Vulnerability
Source: CCN
Type: BID-10037
SGI IRIX ftpd Multiple Denial Of Service Vulnerabilities
Source: XF
Type: UNKNOWN
clamantivirus-virusevent-gain-privileges(15692)
Source: XF
Type: UNKNOWN
clamantivirus-virusevent-gain-privileges(15692)
Vulnerable Configuration:
Configuration 1
:
cpe:/a:clam_anti-virus:clamav:0.51:*:*:*:*:*:*:*
OR
cpe:/a:clam_anti-virus:clamav:0.52:*:*:*:*:*:*:*
OR
cpe:/a:clam_anti-virus:clamav:0.53:*:*:*:*:*:*:*
OR
cpe:/a:clam_anti-virus:clamav:0.54:*:*:*:*:*:*:*
OR
cpe:/a:clam_anti-virus:clamav:0.60:*:*:*:*:*:*:*
OR
cpe:/a:clam_anti-virus:clamav:0.65:*:*:*:*:*:*:*
OR
cpe:/a:clam_anti-virus:clamav:0.67:*:*:*:*:*:*:*
OR
cpe:/a:clam_anti-virus:clamav:0.68:*:*:*:*:*:*:*
OR
cpe:/a:clam_anti-virus:clamav:0.68.1:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:clamav:clamav:*:*:*:*:*:*:*:*
AND
cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
clam_anti-virus
clamav 0.51
clam_anti-virus
clamav 0.52
clam_anti-virus
clamav 0.53
clam_anti-virus
clamav 0.54
clam_anti-virus
clamav 0.60
clam_anti-virus
clamav 0.65
clam_anti-virus
clamav 0.67
clam_anti-virus
clamav 0.68
clam_anti-virus
clamav 0.68.1
clamav
clamav *
gentoo
linux *