CVE-2014-9050
Description
Heap-based buffer overflow in the cli_scanpe function in libclamav/pe.c in ClamAV before 0.98.5 allows remote attackers to cause a denial of service (crash) via a crafted y0da Crypter PE file.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Heap-based buffer overflow in ClamAV before 0.98.5 allows remote attackers to cause a denial of service via a crafted y0da Crypter PE file.
Vulnerability
A heap-based buffer overflow exists in the cli_scanpe function in libclamav/pe.c of ClamAV before version 0.98.5. The vulnerability is triggered when scanning a specially crafted PE file obfuscated with the y0da Crypter packer. The overflow occurs during section header processing where the code fails to properly validate section offsets and sizes, leading to writes beyond allocated heap memory [1][3].
Exploitation
An attacker can exploit this vulnerability by crafting a malicious PE file with manipulated section headers that cause the cli_scanpe function to write beyond the bounds of a heap buffer. The attacker does not require any special privileges or user interaction; simply sending the file to a ClamAV scan (e.g., via email attachment or file upload) is sufficient. No authentication is needed, and the attack vector is remote over the network [2][4].
Impact
Successful exploitation results in a denial of service (crash) of the ClamAV process. While the available references primarily describe a crash, the overflow potentially could be leveraged for arbitrary code execution under certain conditions, as noted in the Ubuntu security advisory [2]. The crash disrupts antivirus scanning capabilities, potentially leaving systems vulnerable to other malware.
Mitigation
The vulnerability is fixed in ClamAV version 0.98.5, which was released on November 25, 2014 [4]. Users should upgrade to this version or later. The official ClamAV blog and Ubuntu security notice confirm the availability of the patched release [2][4]. No workarounds are documented; updating the software is the recommended action.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
101cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*+ 99 more
- cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*range: <=0.94.3
- cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.14:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.14:pre:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.21:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.22:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.23:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.24:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.51:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.52:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.53:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.54:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.60:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.60p:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.65:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.66:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.67:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.67-1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.68:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.68.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.70:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.70:rc:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.71:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.72:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.73:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.74:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.75:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.75.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.80:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.80:rc:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.80_rc:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.80:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.80:rc2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.80:rc3:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.80:rc4:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.81:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.84:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.84:rc2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.86:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.88:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.88.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.88.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.88.3:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.88.4:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.88.5:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.88.6:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.88.7:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.88.7_p0:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.88.7_p1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.8:rc3:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.1_p0:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.2_p0:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.3_p0:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.3_p1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90:rc1.1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90:rc2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90:rc3:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91.2_p0:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91:rc2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.92:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.92.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.92_p0:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.93:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.93.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.93.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.93.3:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.94:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.94.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.94.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:*
- (no CPE)range: <0.98.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- www.ubuntu.com/usn/USN-2423-1nvdPatchVendor Advisory
- github.com/vrtadmin/clamav-devel/commit/fc3794a54d2affe5770c1f876484a871c783e91envdExploit
- blog.clamav.net/2014/11/clamav-0985-has-been-released.htmlnvdVendor Advisory
- lists.fedoraproject.org/pipermail/package-announce/2014-November/144979.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2014-12/msg00003.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2014-12/msg00007.htmlnvd
- secunia.com/advisories/59645nvd
- secunia.com/advisories/62542nvd
- www.openwall.com/lists/oss-security/2014/11/22/1nvd
- www.securityfocus.com/bid/71242nvd
- www.securitytracker.com/id/1031268nvd
News mentions
0No linked articles in our index yet.