Vulnerability in Clamav

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2016-003 CVE-2016-1371 , CVE-2016-1372 03/15/2016 low v1

Vulnerability details

Clamav has been updated in order to fix two CVE

  • CVE-2016-1371 – Crash when processing a crafted mew packer executable
  • CVE-2016-1372 – Multiple vulnerabilities when processing crafted 7z files

Impacted products

ProductsSeverityDetail
Stormshield Network Security low SNS uses a vulnerable version of Clamav

Revisions

Version Date Description
v1 Initial release


Stormshield Network Security

CVSS v2 Overall Score: 3.2      

Analysis

Impacted version

SNS uses a vulnerable version of Clamav. An attacker can crash the clamav daemon by sending a malicious file.

  • SNS 1.x doesn’t use a vulnerable version of Clamav
  • SNS 2.0.0 to 2.4.2

Workaround solution

Solution

You can turn off clamav or use Kaspersky antivirus.

The 2.5.0 update will fix this vulnerability.



Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Network Medium None None Partial Partial
CVSS Base score: 5.8 CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:P)
Exploitability Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 4.3 CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:P/E:U/RL:OF/RC:C)
Collateral Damage Potential Target Distribution
None Medium [26-75%]
CVSS Environmental score: 3.2 CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:P/E:U/RL:OF/RC:C/CDP:N/TD:M/CR:ND/IR:ND/AR:ND)