VYPR
Unrated severityNVD Advisory· Published Nov 17, 2011· Updated Apr 29, 2026

CVE-2011-3627

CVE-2011-3627

Description

The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ClamAV bytecode engine before 0.97.3 mishandles recursion, allowing a remote attacker to cause a denial of service via a crafted file.

Vulnerability

The bytecode engine in ClamAV versions before 0.97.3 contains a flaw in the handling of recursion level in libclamav/bytecode.c and libclamav/bytecode_api.c. This allows a specially crafted file to trigger uncontrolled recursion, causing the application to crash. The vulnerability is referenced in the upstream bug tracker as bb #3706 [1].

Exploitation

An attacker does not need any special privileges or authentication. By delivering a crafted file (e.g., via email attachment, web download, or network share) that is scanned by ClamAV, the recursion limit is exceeded. The crash occurs during bytecode interpretation, leading to a denial of service [1][2].

Impact

Successful exploitation results in a crash of the ClamAV process, causing a denial of service. The impact is limited to availability, with no indication of code execution or privilege escalation [2].

Mitigation

Users should upgrade to ClamAV version 0.97.3, released on October 17, 2011, which fixes the recursion level handling [1]. Ubuntu users can apply USN-1258-1 to update to the patched version [2]. No workaround exists for unpatched installations.

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

44
  • ClamAV/Clamav43 versions
    cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*+ 42 more
    • cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*range: <=0.97.2
    • cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90:rc1:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90:rc1.1:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90:rc2:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.90:rc3:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.91:rc1:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.91:rc2:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.92:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.92.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.93:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.93.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.93.2:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.93.3:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.94:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.94.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.94.2:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.95:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.95.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.95.2:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.95.3:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.95:rc1:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.95:rc2:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.95:src1:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.95:src2:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.96:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.96.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.96.2:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.96.3:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.96.5:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.96:rc1:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.96:rc2:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.97:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.97.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.97:rc:*:*:*:*:*:*
    • cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.