ClamAV – ‘zip bomb’ vulnerability
Advisory ID | CVE Number | Date discovered | Severity | Advisory revision |
---|---|---|---|---|
STORM-2019-009 | CVE-2019-13232 | 08/07/2019 | medium | v2 |
Vulnerability details
ClamAV is vulnerable to malicious compressed archive that will cause the daemon to use a huge amount of CPU-time during a long period of time.
Impacted products
Products | Severity | Detail |
---|---|---|
Stormshield Network Security | medium | ClamAV can potentially consume huge amount of resources |
Netasq | medium | ClamAV can potentially consume huge amount of resources |
Revisions
Version | Date | Description |
---|---|---|
v1 | 08/07/2019 | Initial release |
v2 | 08/14/2019 | Fix id |
Stormshield Network Security |
CVSS v2 Overall Score: 4.2 |
Analysis |
Impacted version |
If the option ‘analyze archives’ is activated and ClamAV is the chosen antivirus then a attacker can trigger this vulnerability by sending a malicious archive, the UTM will be slower to respond during the scan. |
|
Workaround solution |
Solution |
Administrators should turn off the ‘archive analysis’ option in the antivirus configuration if ClamAV is selected. Stormshield advises SNS administrators to open received archives in a workstation with an up-to-date antivirus software or to test them with the free Breachfighter portal https://breachfighter.stormshieldcs.eu, meanwhile a fix is available. |
The SNS 2.7.5, 2.15.0, 3.7.7 and 3.9.1 updates will fix this vulnerability. |
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Network | Low | None | None | None | Partial |
CVSS Base score: 5 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
Proof of concept code | Workaround | Confirmed |
CVSS Temporal score: 4.2 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:W/RC:C) |
Collateral Damage Potential | Target Distribution |
---|---|
None | High [76-100%] |
CVSS Environmental score: 4.2 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:W/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND) |
Netasq |
CVSS v2 Overall Score: 4.2 |
Analysis |
Impacted version |
ClamAV can potentially consume huge amount of resources |
|
Workaround solution |
Solution |
Administrators should turn off the ‘archive analysis’ option in the antivirus configuration if ClamAV is selected. |
no solution |
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Network | Low | None | None | None | Partial |
CVSS Base score: 5 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
Proof of concept code | Workaround | Confirmed |
CVSS Temporal score: 4.2 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:W/RC:C) |
Collateral Damage Potential | Target Distribution |
---|---|
None | High [76-100%] |
CVSS Environmental score: 4.2 | CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:W/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND) |