CVE-2011-3627
Description
The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
ClamAV bytecode engine before 0.97.3 mishandles recursion, allowing a remote attacker to cause a denial of service via a crafted file.
Vulnerability
The bytecode engine in ClamAV versions before 0.97.3 contains a flaw in the handling of recursion level in libclamav/bytecode.c and libclamav/bytecode_api.c. This allows a specially crafted file to trigger uncontrolled recursion, causing the application to crash. The vulnerability is referenced in the upstream bug tracker as bb #3706 [1].
Exploitation
An attacker does not need any special privileges or authentication. By delivering a crafted file (e.g., via email attachment, web download, or network share) that is scanned by ClamAV, the recursion limit is exceeded. The crash occurs during bytecode interpretation, leading to a denial of service [1][2].
Impact
Successful exploitation results in a crash of the ClamAV process, causing a denial of service. The impact is limited to availability, with no indication of code execution or privilege escalation [2].
Mitigation
Users should upgrade to ClamAV version 0.97.3, released on October 17, 2011, which fixes the recursion level handling [1]. Ubuntu users can apply USN-1258-1 to update to the patched version [2]. No workaround exists for unpatched installations.
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
44cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*+ 42 more
- cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*range: <=0.97.2
- cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90:rc1.1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90:rc2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90:rc3:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91:rc2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.92:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.92.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.93:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.93.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.93.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.93.3:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.94:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.94.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.94.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95.3:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95:rc2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95:src1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95:src2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96.3:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96.5:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96:rc2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.97:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.97.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.97:rc:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- secunia.com/advisories/46717nvdVendor Advisory
- secunia.com/advisories/46826nvdVendor Advisory
- git.clamav.net/gitwebnvd
- lists.fedoraproject.org/pipermail/package-announce/2011-November/068940.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2011-November/068941.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2011-November/068942.htmlnvd
- www.openwall.com/lists/oss-security/2011/10/18/1nvd
- www.securityfocus.com/bid/50183nvd
- www.ubuntu.com/usn/USN-1258-1nvd
- bugzilla.redhat.com/show_bug.cginvd
News mentions
0No linked articles in our index yet.