lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1LxU6m-0000Cu-RC@titan.mandriva.com>
Date: Sat, 25 Apr 2009 00:43:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2009:097 ] clamav


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:097
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : clamav
 Date    : April 24, 2009
 Affected: 2008.1, 2009.0, Corporate 3.0, Corporate 4.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been found and corrected in clamav:
 
 Unspecified vulnerability in ClamAV before 0.95 allows remote
 attackers to bypass detection of malware via a modified RAR archive
 (CVE-2009-1241).
 
 libclamav/pe.c in ClamAV before 0.95 allows remote attackers to cause
 a denial of service (crash) via a crafted EXE file that triggers a
 divide-by-zero error (CVE-2008-6680).
 
 libclamav/untar.c in ClamAV before 0.95 allows remote attackers to
 cause a denial of service (infinite loop) via a crafted file that
 causes (1) clamd and (2) clamscan to hang (CVE-2009-1270).
 
 The CLI_ISCONTAINED macro in libclamav/others.h in ClamAV before 0.95.1
 allows remote attackers to cause a denial of service (application
 crash) via a malformed file with UPack encoding (CVE-2009-1371).
 
 Stack-based buffer overflow in the cli_url_canon function in
 libclamav/phishcheck.c in ClamAV before 0.95.1 allows remote attackers
 to cause a denial of service (application crash) and possibly execute
 arbitrary code via a crafted URL (CVE-2009-1372).
 
 Important notice about this upgrade: clamav-0.95+ bundles support
 for RAR v3 in libclamav which is a license violation as the RAR v3
 license and the GPL license is not compatible. As a consequence to
 this Mandriva has been forced to remove the RAR v3 code.
 
 This update provides clamav 0.95.1, which is not vulnerable to
 these issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6680
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1241
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1270
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1371
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1372
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.1:
 b25be221f0404db50a3d4a5a67c3ab1a  2008.1/i586/clamav-0.95.1-2.1mdv2008.1.i586.rpm
 1aa362d1e857f27989e41284611f4773  2008.1/i586/clamav-db-0.95.1-2.1mdv2008.1.i586.rpm
 a25b0a792d0f4a8a611d2cda7ffdb475  2008.1/i586/clamav-milter-0.95.1-2.1mdv2008.1.i586.rpm
 1ede494dfd7ceb6a3d27108e5a2b01ff  2008.1/i586/clamd-0.95.1-2.1mdv2008.1.i586.rpm
 7e98ebece7df4167ffbd7e1bee83fc9c  2008.1/i586/libclamav6-0.95.1-2.1mdv2008.1.i586.rpm
 235c1379ab830ebeb378b9aa3ae46ef4  2008.1/i586/libclamav-devel-0.95.1-2.1mdv2008.1.i586.rpm 
 a4f6214533bb9ef273ff707e59254d28  2008.1/SRPMS/clamav-0.95.1-2.1mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 fd7a2b0c2c41f75489506b403a8ba722  2008.1/x86_64/clamav-0.95.1-2.1mdv2008.1.x86_64.rpm
 1ee04e95195b48185dc31d1bb4a8f338  2008.1/x86_64/clamav-db-0.95.1-2.1mdv2008.1.x86_64.rpm
 6e051b306f9d632702385ec4cd48357c  2008.1/x86_64/clamav-milter-0.95.1-2.1mdv2008.1.x86_64.rpm
 8fd9e0314018de597119d17f150d93bf  2008.1/x86_64/clamd-0.95.1-2.1mdv2008.1.x86_64.rpm
 bfb0d0a6a21bfc98fa0d206c622cb2ad  2008.1/x86_64/lib64clamav6-0.95.1-2.1mdv2008.1.x86_64.rpm
 9cc53a243b850c16a07db35072ecb7f8  2008.1/x86_64/lib64clamav-devel-0.95.1-2.1mdv2008.1.x86_64.rpm 
 a4f6214533bb9ef273ff707e59254d28  2008.1/SRPMS/clamav-0.95.1-2.1mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 d5f17009981b1f8e8acbb9fabb291a5e  2009.0/i586/clamav-0.95.1-2.1mdv2009.0.i586.rpm
 74d4e82cb85e9a0756448f3d47a7df54  2009.0/i586/clamav-db-0.95.1-2.1mdv2009.0.i586.rpm
 6e6a88618d26e6d2b933661a7199ed7c  2009.0/i586/clamav-milter-0.95.1-2.1mdv2009.0.i586.rpm
 6457fce7ff4ac1004bb73b1ce0fb465d  2009.0/i586/clamd-0.95.1-2.1mdv2009.0.i586.rpm
 e02d098cce4fb905ff0772fa03ebdc40  2009.0/i586/libclamav6-0.95.1-2.1mdv2009.0.i586.rpm
 66341a133ab8083a5e45a8374a98c9a7  2009.0/i586/libclamav-devel-0.95.1-2.1mdv2009.0.i586.rpm 
 6e3d1e7f25b2c2c66fe5b6e6ad63e4fd  2009.0/SRPMS/clamav-0.95.1-2.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 f5460c948001225a9d19f3724ed3b38d  2009.0/x86_64/clamav-0.95.1-2.1mdv2009.0.x86_64.rpm
 8d7797121ab856e3ece928b8b8055388  2009.0/x86_64/clamav-db-0.95.1-2.1mdv2009.0.x86_64.rpm
 938cf6cd118d87f8b557de20d234f822  2009.0/x86_64/clamav-milter-0.95.1-2.1mdv2009.0.x86_64.rpm
 641ca4e769bb8ed672a39ca4fc6012ab  2009.0/x86_64/clamd-0.95.1-2.1mdv2009.0.x86_64.rpm
 d9ceb8022fe109b1d78517fca55a0f5a  2009.0/x86_64/lib64clamav6-0.95.1-2.1mdv2009.0.x86_64.rpm
 d593fa36c147eb6e6aaacf8e53410e54  2009.0/x86_64/lib64clamav-devel-0.95.1-2.1mdv2009.0.x86_64.rpm 
 6e3d1e7f25b2c2c66fe5b6e6ad63e4fd  2009.0/SRPMS/clamav-0.95.1-2.1mdv2009.0.src.rpm

 Corporate 3.0:
 b7b6503c5444421f1cd861d97a9c5386  corporate/3.0/i586/clamav-0.95.1-1.1.C30mdk.i586.rpm
 ba931d2fc084fe6c381a82f68d1dfa6e  corporate/3.0/i586/clamav-db-0.95.1-1.1.C30mdk.i586.rpm
 0dc532b543787ba3c314767af94122d2  corporate/3.0/i586/clamd-0.95.1-1.1.C30mdk.i586.rpm
 faf6229623ba8bb4107fe97499af7c54  corporate/3.0/i586/libclamav6-0.95.1-1.1.C30mdk.i586.rpm
 7a593851920975bfeedfd140721fc051  corporate/3.0/i586/libclamav-devel-0.95.1-1.1.C30mdk.i586.rpm 
 5fe4ff2006ad37aa310cdc962448a949  corporate/3.0/SRPMS/clamav-0.95.1-1.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 61d86f3e8e8ded06a756a79443c89754  corporate/3.0/x86_64/clamav-0.95.1-1.1.C30mdk.x86_64.rpm
 9ade30f84acccb03e66fc41093d3fa34  corporate/3.0/x86_64/clamav-db-0.95.1-1.1.C30mdk.x86_64.rpm
 9915774317c81d7cafaa551649de18f6  corporate/3.0/x86_64/clamd-0.95.1-1.1.C30mdk.x86_64.rpm
 ca3929b1611b97147dbba539ba927072  corporate/3.0/x86_64/lib64clamav6-0.95.1-1.1.C30mdk.x86_64.rpm
 079134b649c3b867e8df0fe2abdaa9a8  corporate/3.0/x86_64/lib64clamav-devel-0.95.1-1.1.C30mdk.x86_64.rpm 
 5fe4ff2006ad37aa310cdc962448a949  corporate/3.0/SRPMS/clamav-0.95.1-1.1.C30mdk.src.rpm

 Corporate 4.0:
 8a3d40f2eb11de32d4f812719205588f  corporate/4.0/i586/clamav-0.95.1-1.1.20060mlcs4.i586.rpm
 f19380a3503527a5fb14687f1712a7f1  corporate/4.0/i586/clamav-db-0.95.1-1.1.20060mlcs4.i586.rpm
 211b72834f384601e22987a4942dc445  corporate/4.0/i586/clamav-milter-0.95.1-1.1.20060mlcs4.i586.rpm
 a1198afbb6c424b05d2cfc521ef84804  corporate/4.0/i586/clamd-0.95.1-1.1.20060mlcs4.i586.rpm
 04bb78c1b13402e8af8edb2fa3e4c84f  corporate/4.0/i586/libclamav6-0.95.1-1.1.20060mlcs4.i586.rpm
 5bc0075e65496951761da1f37a30b431  corporate/4.0/i586/libclamav-devel-0.95.1-1.1.20060mlcs4.i586.rpm 
 92ceb46391b875526b3537f34703c51b  corporate/4.0/SRPMS/clamav-0.95.1-1.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 aa317fef6d868d99b2ce22c0334ea059  corporate/4.0/x86_64/clamav-0.95.1-1.1.20060mlcs4.x86_64.rpm
 17f64c31b8fc2a73db2680f9b8056c0d  corporate/4.0/x86_64/clamav-db-0.95.1-1.1.20060mlcs4.x86_64.rpm
 1cf5fe4bb11ce1940d4f95efb642e203  corporate/4.0/x86_64/clamav-milter-0.95.1-1.1.20060mlcs4.x86_64.rpm
 ab4106cf7bfa8b5407dfe0fb784e48d3  corporate/4.0/x86_64/clamd-0.95.1-1.1.20060mlcs4.x86_64.rpm
 600e3d90e14a4e5b37d6bae04fe0fbe3  corporate/4.0/x86_64/lib64clamav6-0.95.1-1.1.20060mlcs4.x86_64.rpm
 e494d19586e60e9a0d114d960301cdf3  corporate/4.0/x86_64/lib64clamav-devel-0.95.1-1.1.20060mlcs4.x86_64.rpm 
 92ceb46391b875526b3537f34703c51b  corporate/4.0/SRPMS/clamav-0.95.1-1.1.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJ8hZomqjQ0CJFipgRAh5nAKDFL4629xP6V37fANiHCmIO62HNowCgsP9T
sh+l4euCUhExmgO4scmkFYE=
=vUEQ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ