#VU32844 Resource management error in ClamAV - cve-2011-1003
Published: February 23, 2011 / Updated: July 28, 2020
ClamAV
ClamAV
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Double free vulnerability in the vba_read_project_strings function in vba_extract.c in libclamav in ClamAV before 0.97 might allow remote attackers to execute arbitrary code via crafted Visual Basic for Applications (VBA) data in a Microsoft Office document. NOTE: some of these details are obtained from third party information.
Remediation
External links
- http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob;f=ChangeLog;hb=clamav-0.97
- http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=d21fb8d975f8c9688894a8cef4d50d977022e09f
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055771.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055777.html
- http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
- http://openwall.com/lists/oss-security/2011/02/21/1
- http://openwall.com/lists/oss-security/2011/02/21/4
- http://osvdb.org/70937
- http://secunia.com/advisories/43392
- http://secunia.com/advisories/43498
- http://secunia.com/advisories/43752
- http://securitytracker.com/id?1025100
- http://www.mandriva.com/en/support/security/advisories/?name=MDVA-2011:007
- http://www.securityfocus.com/bid/46470
- http://www.ubuntu.com/usn/USN-1076-1
- http://www.vupen.com/english/advisories/2011/0453
- http://www.vupen.com/english/advisories/2011/0458
- http://www.vupen.com/english/advisories/2011/0523
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65544
- https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2486