Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in clamav
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in clamav
ID: MDVSA-2009:327
Distribution: Mandriva
Plattformen: Mandriva 2008.0
Datum: Di, 8. Dezember 2009, 17:48
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6680
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1241
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1270
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1372
Applikationen: Clam Antivirus

Originalnachricht

This is a multi-part message in MIME format...

------------=_1260290910-24326-1833


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:327
http://www.mandriva.com/security/
_______________________________________________________________________

Package : clamav
Date : December 8, 2009
Affected: 2008.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities has been found and corrected in clamav:

Unspecified vulnerability in ClamAV before 0.95 allows remote
attackers to bypass detection of malware via a modified RAR archive
(CVE-2009-1241).

libclamav/pe.c in ClamAV before 0.95 allows remote attackers to cause
a denial of service (crash) via a crafted EXE file that triggers a
divide-by-zero error (CVE-2008-6680).

libclamav/untar.c in ClamAV before 0.95 allows remote attackers to
cause a denial of service (infinite loop) via a crafted file that
causes (1) clamd and (2) clamscan to hang (CVE-2009-1270).

The CLI_ISCONTAINED macro in libclamav/others.h in ClamAV before 0.95.1
allows remote attackers to cause a denial of service (application
crash) via a malformed file with UPack encoding (CVE-2009-1371).

Stack-based buffer overflow in the cli_url_canon function in
libclamav/phishcheck.c in ClamAV before 0.95.1 allows remote attackers
to cause a denial of service (application crash) and possibly execute
arbitrary code via a crafted URL (CVE-2009-1372).

Important notice about this upgrade: clamav-0.95+ bundles support
for RAR v3 in libclamav which is a license violation as the RAR v3
license and the GPL license is not compatible. As a consequence to
this Mandriva has been forced to remove the RAR v3 code.

Packages for 2008.0 are being provided due to extended support for
Corporate products.

This update provides clamav 0.95.2, which is not vulnerable to these
issues. Additionally klamav-0.46 is being provided that has support
for clamav-0.95+.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6680
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1241
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1270
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1372
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
d4e8e17141e413c9e87a64b7181627e2
2008.0/i586/clamav-0.95.2-0.1mdv2008.0.i586.rpm
9179be11ae65a206e3b1c6075836db93
2008.0/i586/clamav-db-0.95.2-0.1mdv2008.0.i586.rpm
4d3b2e34434bb8ff057205f3575900a4
2008.0/i586/clamav-milter-0.95.2-0.1mdv2008.0.i586.rpm
377e99d065097abc4b8a7e4817f4f9f1
2008.0/i586/clamd-0.95.2-0.1mdv2008.0.i586.rpm
253062120fa32d9d42c9058516a72153
2008.0/i586/klamav-0.46-0.1mdv2008.0.i586.rpm
9ef37702dc560d9941d982cfffeea6af
2008.0/i586/libclamav6-0.95.2-0.1mdv2008.0.i586.rpm
b9aa169bb1ef5fcad2e59deea2cfbb41
2008.0/i586/libclamav-devel-0.95.2-0.1mdv2008.0.i586.rpm
b9a99dc63a69f9b4203fb95bc5d5ff12
2008.0/SRPMS/clamav-0.95.2-0.1mdv2008.0.src.rpm
6a46b5c8bbf5429512e4b1924243526e
2008.0/SRPMS/klamav-0.46-0.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
4ac8f83b42541e50585c6ee6abd96ba8
2008.0/x86_64/clamav-0.95.2-0.1mdv2008.0.x86_64.rpm
a1281d397120c7404f05d952dfa117b7
2008.0/x86_64/clamav-db-0.95.2-0.1mdv2008.0.x86_64.rpm
8c1dc967687df31c29a01a43fcc487ed
2008.0/x86_64/clamav-milter-0.95.2-0.1mdv2008.0.x86_64.rpm
109b738b88ebb607d2456ea1797d48cd
2008.0/x86_64/clamd-0.95.2-0.1mdv2008.0.x86_64.rpm
b3dcaa53da6e1413924e2f1f3c611854
2008.0/x86_64/klamav-0.46-0.1mdv2008.0.x86_64.rpm
2b7975248a809f3cfe9a2c5c7f0719f1
2008.0/x86_64/lib64clamav6-0.95.2-0.1mdv2008.0.x86_64.rpm
3068f027586ef92661f8a6c60fd6ea3e
2008.0/x86_64/lib64clamav-devel-0.95.2-0.1mdv2008.0.x86_64.rpm
b9a99dc63a69f9b4203fb95bc5d5ff12
2008.0/SRPMS/clamav-0.95.2-0.1mdv2008.0.src.rpm
6a46b5c8bbf5429512e4b1924243526e
2008.0/SRPMS/klamav-0.46-0.1mdv2008.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLHlb7mqjQ0CJFipgRArB7AJ96vycVt/sc1YDwjmFkzl20gzfsRQCgsJEp
0vt39CYEd6o0ENF/6xMWYis=
=VxRu
-----END PGP SIGNATURE-----


------------=_1260290910-24326-1833
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1260290910-24326-1833--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung