Vulnerability Details : CVE-2008-1389
libclamav/chmunpack.c in the chm-parser in ClamAV before 0.94 allows remote attackers to cause a denial of service (application crash) via a malformed CHM file, related to an "invalid memory access."
Vulnerability category: Denial of service
Products affected by CVE-2008-1389
- cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.60:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.60p:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.65:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.54:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.67:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.52:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.53:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.51:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.68:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.68.1:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.80:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.90.2:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.81:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.82:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.83:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.85:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.85.1:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.86:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.75:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.75.1:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.73:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.74:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.84:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.70:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.71:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.72:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.86.1:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.86.2:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.87:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.23:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.24:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.21:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.22:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.15:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.20:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.87.1:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.88:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.88.1:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.88.3:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.88.6:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.88.4:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.90:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.90.1:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.88.5:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.88.7:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.91.1:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.91.2:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.92:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.92.1:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.91:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.12:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.13:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.14:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.14:pre:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.80:rc:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.84:rc1:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.86:rc1:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.80:rc2:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.80:rc3:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.84:rc2:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.93:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.11:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.80:rc4:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.81:rc1:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.88.2:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.90.3:*:*:*:*:*:*:*
- cpe:2.3:a:clam_anti-virus:clamav:0.93.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-1389
11.96%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-1389
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2008-1389
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-1389
-
http://kolab.org/security/kolab-vendor-notice-22.txt
Page not found
-
http://sourceforge.net/project/shownotes.php?group_id=86638&release_id=623661
Clam AntiVirus download | SourceForge.netPatch
-
https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1089
-
http://www.vupen.com/english/advisories/2008/2564
Site en construction
-
http://security.gentoo.org/glsa/glsa-200809-18.xml
ClamAV: Multiple Denials of Service (GLSA 200809-18) — Gentoo security
-
http://www.securitytracker.com/id?1020805
GoDaddy Domain Name Search
-
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
-
http://int21.de/cve/CVE-2008-1389-clamav-chd.html
clamav: Crash with crafted chm, CVE-2008-1389
-
http://www.securityfocus.com/bid/30994
-
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00348.html
[SECURITY] Fedora 8 Update: clamav-0.92.1-4.fc8
-
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00332.html
[SECURITY] Fedora 9 Update: clamav-0.93.3-2.fc9
-
http://www.vupen.com/english/advisories/2008/2780
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://support.apple.com/kb/HT3216
About Security Update 2008-007 - Apple Support
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:189
Mandriva
-
http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog
-
http://www.securityfocus.com/bid/31681
-
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2008:018 - openSUSE Security Announce - openSUSE Mailing Lists
-
http://www.vupen.com/english/advisories/2008/2484
Site en construction
Jump to