Vulnerability Details : CVE-2005-1923
The ENSURE_BITS macro in mszipd.c for Clam AntiVirus (ClamAV) 0.83, and other versions vefore 0.86, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a cabinet (CAB) file with the cffile_FolderOffset field set to 0xff, which causes a zero-length read.
Vulnerability category: Denial of service
Products affected by CVE-2005-1923
- cpe:2.3:a:clam_anti-virus:clamav:0.83:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.84_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.84_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.85:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.85.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-1923
0.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 53 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-1923
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.6
|
LOW | AV:N/AC:H/Au:N/C:N/I:N/A:P |
4.9
|
2.9
|
NIST |
References for CVE-2005-1923
-
http://www.debian.org/security/2005/dsa-737
[SECURITY] [DSA 737-1] New clamav packages fix potential DOS
-
http://www.idefense.com/application/poi/display?id=275&type=vulnerabilities
U.S. | Let There Be Change | AccenturePatch;Vendor Advisory
Jump to