Gentoo Logo

ClamAV: Multiple vulnerabilities

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200604-06 / clamav
Release Date April 07, 2006
Latest Revision April 07, 2006: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
app-antivirus/clamav < 0.88.1 >= 0.88.1 All supported architectures

Related bugreports: #128963

Synopsis

ClamAV contains multiple vulnerabilities that could lead to remote execution of arbitrary code or cause an application crash.

2.  Impact Information

Background

ClamAV is a GPL virus scanner.

Description

ClamAV contains format string vulnerabilities in the logging code (CVE-2006-1615). Furthermore Damian Put discovered an integer overflow in ClamAV's PE header parser (CVE-2006-1614) and David Luyer discovered that ClamAV can be tricked into performing an invalid memory access (CVE-2006-1630).

Impact

By sending a malicious attachment to a mail server running ClamAV, a remote attacker could cause a Denial of Service or the execution of arbitrary code. Note that the overflow in the PE header parser is only exploitable when the ArchiveMaxFileSize option is disabled.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All ClamAV users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88.1"

4.  References



Print

Page updated April 07, 2006

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.