VYPR
Unrated severityNVD Advisory· Published Feb 12, 2008· Updated Apr 23, 2026

CVE-2008-0728

CVE-2008-0728

Description

The unmew11 function in libclamav/mew.c in libclamav in ClamAV before 0.92.1 has unknown impact and attack vectors that trigger "heap corruption."

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unspecified heap corruption vulnerability in ClamAV before 0.92.1, via the unmew11 function in libclamav/mew.c, allows remote attackers to cause a crash or potentially execute arbitrary code.

Vulnerability

The vulnerability resides in the unmew11 function within libclamav/mew.c in ClamAV before version 0.92.1. The function handles unpacking of MEW-compressed files and contains a flaw that leads to heap corruption. The exact root cause is not publicly detailed, but the issue affects all ClamAV versions prior to 0.92.1 [1][2][3].

Exploitation

Exploitation requires a remote attacker to craft a specially crafted file that triggers the heap corruption when scanned by ClamAV. The attacker must entice a user or an automated system (e.g., an email gateway) to scan the malicious file. No authentication is required, and user interaction is limited to the victim scanning the file. The specific attack vector is not fully disclosed, but the heap corruption can potentially be leveraged for further exploitation [3].

Impact

A successful exploit can lead to arbitrary code execution with the privileges of the user running ClamAV (typically a system user or the 'clamav' user if clamd is compromised). This enables an attacker to compromise the scanning system, potentially execute commands, install malware, or extract sensitive data. The vulnerability may also cause denial of service through a crash [3].

Mitigation

ClamAV 0.92.1 fixed the issue, released around February 14, 2008. Users should upgrade to version 0.92.1 or later. No workaround was available at the time of disclosure. The update is provided through official channels for various distributions, including SUSE and Gentoo [1][2][3].

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

91
  • ClamAV/Clamav90 versions
    cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*+ 89 more
    • cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*range: <=0.92
    • cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.14:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.14:pre:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.21:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.22:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.23:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.24:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.51:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.52:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.53:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.54:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.60:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.60p:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.65:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.66:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.67:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.67-1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.68:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.68.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.70:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.70:rc:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.71:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.72:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.73:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.74:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.75:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.75.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.80:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.80:rc:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.80_rc:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.80:rc1:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.80:rc2:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.80:rc3:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.80:rc4:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.81:rc1:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.84:rc1:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.84:rc2:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.86:rc1:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.88:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.88.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.88.2:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.88.3:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.88.4:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.88.5:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.88.6:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.88.7:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.88.7_p0:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.88.7_p1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.8:rc3:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90.1_p0:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90.2_p0:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90.3_p0:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90.3_p1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90:rc1:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90:rc1.1:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90:rc2:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90:rc3:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.91.2_p0:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.91:rc1:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.91:rc2:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.92_p0:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

19

News mentions

0

No linked articles in our index yet.