Vulnerability Description
The "%f" feature in the VirusEvent directive in Clam AntiVirus daemon (clamd) before 0.70 allows local users to execute arbitrary commands via shell metacharacters in a file name.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Clam Anti-Virus | Clamav | 0.51 |
References
- http://marc.info/?l=bugtraq&m=108066864608615&w=2
- http://secunia.com/advisories/11253PatchVendor Advisory
- http://security.gentoo.org/glsa/glsa-200405-03.xmlPatchVendor Advisory
- http://www.securityfocus.com/bid/10007ExploitPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15692
- http://marc.info/?l=bugtraq&m=108066864608615&w=2
- http://secunia.com/advisories/11253PatchVendor Advisory
- http://security.gentoo.org/glsa/glsa-200405-03.xmlPatchVendor Advisory
- http://www.securityfocus.com/bid/10007ExploitPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15692
FAQ
What is CVE-2004-1876?
CVE-2004-1876 is a vulnerability with a CVSS score of 4.6 (MEDIUM). The "%f" feature in the VirusEvent directive in Clam AntiVirus daemon (clamd) before 0.70 allows local users to execute arbitrary commands via shell metacharacters in a file name.
How severe is CVE-2004-1876?
CVE-2004-1876 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1876?
Check the references section above for vendor advisories and patch information. Affected products include: Clam Anti-Virus Clamav.