GLSA Advocate

Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Jul 26, 2005 9:01 pm Post subject: [ GLSA 200507-25 ] Clam AntiVirus: Integer overflows |
|
|
Gentoo Linux Security Advisory
Title: Clam AntiVirus: Integer overflows (GLSA 200507-25)
Severity: high
Exploitable: remote
Date: July 26, 2005
Updated: August 11, 2005
Bug(s): #100178
ID: 200507-25
Synopsis
Clam AntiVirus is vulnerable to integer overflows when handling several
file formats, potentially resulting in the execution of arbitrary code.
Background
Clam AntiVirus is a GPL anti-virus toolkit, designed for integration
with mail servers to perform attachment scanning. Clam AntiVirus also
provides a command line scanner and a tool for fetching updates of the
virus database.
Affected Packages
Package: app-antivirus/clamav
Vulnerable: < 0.86.2
Unaffected: >= 0.86.2
Architectures: All supported architectures
Description
Neel Mehta and Alex Wheeler discovered that Clam AntiVirus is
vulnerable to integer overflows when handling the TNEF, CHM and FSG
file formats.
Impact
By sending a specially-crafted file an attacker could execute arbitrary
code with the permissions of the user running Clam AntiVirus.
Workaround
There is no known workaround at this time.
Resolution
All Clam AntiVirus users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.86.2" |
References
CAN-2005-2450
Clam AntiVirus: Release Notes
Last edited by GLSA on Fri May 09, 2014 4:20 am; edited 3 times in total |
|