ClamAV Security Bypass And Memory Corruption Vulnerabilities (Win)

Summary
This host has ClamAV installed, and is prone to security bypass and memory corruption vulnerabilities.
Impact
Successful exploitation will allow attackers to bypass certain security restrictions. Impact Level: System/Application
Solution
Upgrade to ClamAV 0.96 or later, For updates refer to http://www.clamav.net
Insight
The flaws are due to: - An error in handling of 'CAB' and '7z' file formats, which allows to bypass virus detection via a crafted archive that is compatible with standard archive utilities. - An error in 'qtm_decompress' function in 'libclamav/mspack.c', which allows to crash application via a crafted CAB archive that uses the Quantum.
Affected
ClamAV version before 0.96 (1.0.26) on Windows.
References