Vulnerability in Clamav
Vulnerability details
Clamav has been updated in order to fix two CVE
- CVE-2016-1371 – Crash when processing a crafted mew packer executable
- CVE-2016-1372 – Multiple vulnerabilities when processing crafted 7z files
Impacted products
Revisions
Version |
Date |
Description |
v1 |
|
Initial release |
Stormshield Network Security |
CVSS v2 Overall Score: 3.2 
|
Analysis
|
Impacted version
|
SNS uses a vulnerable version of Clamav. An attacker can crash the clamav daemon by sending a malicious file.
|
- SNS 1.x doesn’t use a vulnerable version of Clamav
- SNS 2.0.0 to 2.4.2
|
Workaround solution
|
Solution
|
You can turn off clamav or use Kaspersky antivirus.
|
The 2.5.0 update will fix this vulnerability.
|
Access vector |
Access complexity |
Authentication |
Confidentiality impact |
Integrity impact |
Availability impact |
Network |
Medium |
None |
None |
Partial |
Partial |
Exploitability |
Remediation Level |
Report Confidence |
Unproven that exploit exists |
Official fix |
Confirmed |
Collateral Damage Potential |
Target Distribution |
None |
Medium [26-75%] |