Vulnerability Name:

CVE-2005-0133 (CCN-19181)

Assigned:2005-02-01
Published:2005-02-01
Updated:2008-09-10
Summary:ClamAV 0.80 and earlier allows remote attackers to cause a denial of service (clamd daemon crash) via a ZIP file with malformed headers.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2005-0133

Source: CONECTIVA
Type: Patch, Vendor Advisory
CLA-2005:928

Source: CONFIRM
Type: Patch
http://sourceforge.net/project/shownotes.php?release_id=300116

Source: CCN
Type: Clam AntiVirus Web site
Clam AntiVirus

Source: CCN
Type: GLSA-200501-46
ClamAV: Multiple issues

Source: GENTOO
Type: Patch, Vendor Advisory
GLSA-200501-46

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2005:025

Source: CCN
Type: OSVDB ID: 13342
Clam AntiVirus ZIP Scanning DoS

Source: CCN
Type: OSVDB ID: 13343
Clam AntiVirus BMP File Scan Bypass

Source: CCN
Type: BID-12408
Clam Anti-Virus ClamAV ZIP File Parsing Remote Denial Of Service Vulnerability

Source: TRUSTIX
Type: Patch, Vendor Advisory
2005-0003

Source: XF
Type: UNKNOWN
clam-antivirus-dos(19181)

Source: SUSE
Type: SUSE-SR:2005:003
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:clam_anti-virus:clamav:0.51:*:*:*:*:*:*:*
  • OR cpe:/a:clam_anti-virus:clamav:0.52:*:*:*:*:*:*:*
  • OR cpe:/a:clam_anti-virus:clamav:0.53:*:*:*:*:*:*:*
  • OR cpe:/a:clam_anti-virus:clamav:0.54:*:*:*:*:*:*:*
  • OR cpe:/a:clam_anti-virus:clamav:0.60:*:*:*:*:*:*:*
  • OR cpe:/a:clam_anti-virus:clamav:0.65:*:*:*:*:*:*:*
  • OR cpe:/a:clam_anti-virus:clamav:0.67:*:*:*:*:*:*:*
  • OR cpe:/a:clam_anti-virus:clamav:0.68:*:*:*:*:*:*:*
  • OR cpe:/a:clam_anti-virus:clamav:0.68.1:*:*:*:*:*:*:*
  • OR cpe:/a:clam_anti-virus:clamav:0.80:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    clam_anti-virus clamav 0.51
    clam_anti-virus clamav 0.52
    clam_anti-virus clamav 0.53
    clam_anti-virus clamav 0.54
    clam_anti-virus clamav 0.60
    clam_anti-virus clamav 0.65
    clam_anti-virus clamav 0.67
    clam_anti-virus clamav 0.68
    clam_anti-virus clamav 0.68.1
    clam_anti-virus clamav 0.80