Package : clamav Vulnerability : several Problem-Type : remote Debian-specific: no CVE ID : CVE-2006-1614 CVE-2006-1615 CVE-2006-1630
Several remote vulnerabilities have been discovered in the ClamAV anti-virus toolkit, which may lead to denial of service and potentially to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:
Damian Put discovered an integer overflow in the PE header parser. This is only exploitable if the ArchiveMaxFileSize option is disabled.
Format string vulnerabilities in the logging code have been discovered, which might lead to the execution of arbitrary code.
David Luyer discovered, that ClamAV can be tricked into an invalid memory access in the cli_bitset_set() function, which may lead to a denial of service.
The old stable distribution (woody) doesn't contain clamav packages.
For the stable distribution (sarge) these problems have been fixed in version 0.84-2.sarge.8.
For the unstable distribution (sid) these problems have been fixed in version 0.88.1-1.
We recommend that you upgrade your clamav package.
Upgrade Instructions - --------------------
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge - --------------------------------