Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Security Announce] [ MDVSA-2009:097 ] clamav

Recommended Posts

This is a multi-part message in MIME format...

 

------------=_1240610252-27111-1784

 

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

_______________________________________________________________________

 

Mandriva Linux Security Advisory MDVSA-2009:097

http://www.mandriva.com/security/

_______________________________________________________________________

 

Package : clamav

Date : April 24, 2009

Affected: 2008.1, 2009.0, Corporate 3.0, Corporate 4.0

_______________________________________________________________________

 

Problem Description:

 

Multiple vulnerabilities has been found and corrected in clamav:

 

Unspecified vulnerability in ClamAV before 0.95 allows remote

attackers to bypass detection of malware via a modified RAR archive

(CVE-2009-1241).

 

libclamav/pe.c in ClamAV before 0.95 allows remote attackers to cause

a denial of service (crash) via a crafted EXE file that triggers a

divide-by-zero error (CVE-2008-6680).

 

libclamav/untar.c in ClamAV before 0.95 allows remote attackers to

cause a denial of service (infinite loop) via a crafted file that

causes (1) clamd and (2) clamscan to hang (CVE-2009-1270).

 

The CLI_ISCONTAINED macro in libclamav/others.h in ClamAV before 0.95.1

allows remote attackers to cause a denial of service (application

crash) via a malformed file with UPack encoding (CVE-2009-1371).

 

Stack-based buffer overflow in the cli_url_canon function in

libclamav/phishcheck.c in ClamAV before 0.95.1 allows remote attackers

to cause a denial of service (application crash) and possibly execute

arbitrary code via a crafted URL (CVE-2009-1372).

 

Important notice about this upgrade: clamav-0.95+ bundles support

for RAR v3 in libclamav which is a license violation as the RAR v3

license and the GPL license is not compatible. As a consequence to

this Mandriva has been forced to remove the RAR v3 code.

 

This update provides clamav 0.95.1, which is not vulnerable to

these issues.

_______________________________________________________________________

 

References:

 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6680

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1241

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1270

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1371

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1372

_______________________________________________________________________

 

Updated Packages:

 

Mandriva Linux 2008.1:

b25be221f0404db50a3d4a5a67c3ab1a 2008.1/i586/clamav-0.95.1-2.1mdv2008.1.i586.rpm

1aa362d1e857f27989e41284611f4773 2008.1/i586/clamav-db-0.95.1-2.1mdv2008.1.i586.rpm

a25b0a792d0f4a8a611d2cda7ffdb475 2008.1/i586/clamav-milter-0.95.1-2.1mdv2008.1.i586.rpm

1ede494dfd7ceb6a3d27108e5a2b01ff 2008.1/i586/clamd-0.95.1-2.1mdv2008.1.i586.rpm

7e98ebece7df4167ffbd7e1bee83fc9c 2008.1/i586/libclamav6-0.95.1-2.1mdv2008.1.i586.rpm

235c1379ab830ebeb378b9aa3ae46ef4 2008.1/i586/libclamav-devel-0.95.1-2.1mdv2008.1.i586.rpm

a4f6214533bb9ef273ff707e59254d28 2008.1/SRPMS/clamav-0.95.1-2.1mdv2008.1.src.rpm

 

Mandriva Linux 2008.1/X86_64:

fd7a2b0c2c41f75489506b403a8ba722 2008.1/x86_64/clamav-0.95.1-2.1mdv2008.1.x86_64.rpm

1ee04e95195b48185dc31d1bb4a8f338 2008.1/x86_64/clamav-db-0.95.1-2.1mdv2008.1.x86_64.rpm

6e051b306f9d632702385ec4cd48357c 2008.1/x86_64/clamav-milter-0.95.1-2.1mdv2008.1.x86_64.rpm

8fd9e0314018de597119d17f150d93bf 2008.1/x86_64/clamd-0.95.1-2.1mdv2008.1.x86_64.rpm

bfb0d0a6a21bfc98fa0d206c622cb2ad 2008.1/x86_64/lib64clamav6-0.95.1-2.1mdv2008.1.x86_64.rpm

9cc53a243b850c16a07db35072ecb7f8 2008.1/x86_64/lib64clamav-devel-0.95.1-2.1mdv2008.1.x86_64.rpm

a4f6214533bb9ef273ff707e59254d28 2008.1/SRPMS/clamav-0.95.1-2.1mdv2008.1.src.rpm

 

Mandriva Linux 2009.0:

d5f17009981b1f8e8acbb9fabb291a5e 2009.0/i586/clamav-0.95.1-2.1mdv2009.0.i586.rpm

74d4e82cb85e9a0756448f3d47a7df54 2009.0/i586/clamav-db-0.95.1-2.1mdv2009.0.i586.rpm

6e6a88618d26e6d2b933661a7199ed7c 2009.0/i586/clamav-milter-0.95.1-2.1mdv2009.0.i586.rpm

6457fce7ff4ac1004bb73b1ce0fb465d 2009.0/i586/clamd-0.95.1-2.1mdv2009.0.i586.rpm

e02d098cce4fb905ff0772fa03ebdc40 2009.0/i586/libclamav6-0.95.1-2.1mdv2009.0.i586.rpm

66341a133ab8083a5e45a8374a98c9a7 2009.0/i586/libclamav-devel-0.95.1-2.1mdv2009.0.i586.rpm

6e3d1e7f25b2c2c66fe5b6e6ad63e4fd 2009.0/SRPMS/clamav-0.95.1-2.1mdv2009.0.src.rpm

 

Mandriva Linux 2009.0/X86_64:

f5460c948001225a9d19f3724ed3b38d 2009.0/x86_64/clamav-0.95.1-2.1mdv2009.0.x86_64.rpm

8d7797121ab856e3ece928b8b8055388 2009.0/x86_64/clamav-db-0.95.1-2.1mdv2009.0.x86_64.rpm

938cf6cd118d87f8b557de20d234f822 2009.0/x86_64/clamav-milter-0.95.1-2.1mdv2009.0.x86_64.rpm

641ca4e769bb8ed672a39ca4fc6012ab 2009.0/x86_64/clamd-0.95.1-2.1mdv2009.0.x86_64.rpm

d9ceb8022fe109b1d78517fca55a0f5a 2009.0/x86_64/lib64clamav6-0.95.1-2.1mdv2009.0.x86_64.rpm

d593fa36c147eb6e6aaacf8e53410e54 2009.0/x86_64/lib64clamav-devel-0.95.1-2.1mdv2009.0.x86_64.rpm

6e3d1e7f25b2c2c66fe5b6e6ad63e4fd 2009.0/SRPMS/clamav-0.95.1-2.1mdv2009.0.src.rpm

 

Corporate 3.0:

b7b6503c5444421f1cd861d97a9c5386 corporate/3.0/i586/clamav-0.95.1-1.1.C30mdk.i586.rpm

ba931d2fc084fe6c381a82f68d1dfa6e corporate/3.0/i586/clamav-db-0.95.1-1.1.C30mdk.i586.rpm

0dc532b543787ba3c314767af94122d2 corporate/3.0/i586/clamd-0.95.1-1.1.C30mdk.i586.rpm

faf6229623ba8bb4107fe97499af7c54 corporate/3.0/i586/libclamav6-0.95.1-1.1.C30mdk.i586.rpm

7a593851920975bfeedfd140721fc051 corporate/3.0/i586/libclamav-devel-0.95.1-1.1.C30mdk.i586.rpm

5fe4ff2006ad37aa310cdc962448a949 corporate/3.0/SRPMS/clamav-0.95.1-1.1.C30mdk.src.rpm

 

Corporate 3.0/X86_64:

61d86f3e8e8ded06a756a79443c89754 corporate/3.0/x86_64/clamav-0.95.1-1.1.C30mdk.x86_64.rpm

9ade30f84acccb03e66fc41093d3fa34 corporate/3.0/x86_64/clamav-db-0.95.1-1.1.C30mdk.x86_64.rpm

9915774317c81d7cafaa551649de18f6 corporate/3.0/x86_64/clamd-0.95.1-1.1.C30mdk.x86_64.rpm

ca3929b1611b97147dbba539ba927072 corporate/3.0/x86_64/lib64clamav6-0.95.1-1.1.C30mdk.x86_64.rpm

079134b649c3b867e8df0fe2abdaa9a8 corporate/3.0/x86_64/lib64clamav-devel-0.95.1-1.1.C30mdk.x86_64.rpm

5fe4ff2006ad37aa310cdc962448a949 corporate/3.0/SRPMS/clamav-0.95.1-1.1.C30mdk.src.rpm

 

Corporate 4.0:

8a3d40f2eb11de32d4f812719205588f corporate/4.0/i586/clamav-0.95.1-1.1.20060mlcs4.i586.rpm

f19380a3503527a5fb14687f1712a7f1 corporate/4.0/i586/clamav-db-0.95.1-1.1.20060mlcs4.i586.rpm

211b72834f384601e22987a4942dc445 corporate/4.0/i586/clamav-milter-0.95.1-1.1.20060mlcs4.i586.rpm

a1198afbb6c424b05d2cfc521ef84804 corporate/4.0/i586/clamd-0.95.1-1.1.20060mlcs4.i586.rpm

04bb78c1b13402e8af8edb2fa3e4c84f corporate/4.0/i586/libclamav6-0.95.1-1.1.20060mlcs4.i586.rpm

5bc0075e65496951761da1f37a30b431 corporate/4.0/i586/libclamav-devel-0.95.1-1.1.20060mlcs4.i586.rpm

92ceb46391b875526b3537f34703c51b corporate/4.0/SRPMS/clamav-0.95.1-1.1.20060mlcs4.src.rpm

 

Corporate 4.0/X86_64:

aa317fef6d868d99b2ce22c0334ea059 corporate/4.0/x86_64/clamav-0.95.1-1.1.20060mlcs4.x86_64.rpm

17f64c31b8fc2a73db2680f9b8056c0d corporate/4.0/x86_64/clamav-db-0.95.1-1.1.20060mlcs4.x86_64.rpm

1cf5fe4bb11ce1940d4f95efb642e203 corporate/4.0/x86_64/clamav-milter-0.95.1-1.1.20060mlcs4.x86_64.rpm

ab4106cf7bfa8b5407dfe0fb784e48d3 corporate/4.0/x86_64/clamd-0.95.1-1.1.20060mlcs4.x86_64.rpm

600e3d90e14a4e5b37d6bae04fe0fbe3 corporate/4.0/x86_64/lib64clamav6-0.95.1-1.1.20060mlcs4.x86_64.rpm

e494d19586e60e9a0d114d960301cdf3 corporate/4.0/x86_64/lib64clamav-devel-0.95.1-1.1.20060mlcs4.x86_64.rpm

92ceb46391b875526b3537f34703c51b corporate/4.0/SRPMS/clamav-0.95.1-1.1.20060mlcs4.src.rpm

_______________________________________________________________________

 

To upgrade automatically use MandrivaUpdate or urpmi. The verification

of md5 checksums and GPG signatures is performed automatically for you.

 

All packages are signed by Mandriva for security. You can obtain the

GPG public key of the Mandriva Security Team by executing:

 

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 

You can view other update advisories for Mandriva Linux at:

 

http://www.mandriva.com/security/advisories

 

If you want to report vulnerabilities, please contact

 

security_(at)_mandriva.com

_______________________________________________________________________

 

Type Bits/KeyID Date User ID

pub 1024D/22458A98 2000-07-10 Mandriva Security Team

 

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.9 (GNU/Linux)

 

iD8DBQFJ8hZomqjQ0CJFipgRAh5nAKDFL4629xP6V37fANiHCmIO62HNowCgsP9T

sh+l4euCUhExmgO4scmkFYE=

=vUEQ

-----END PGP SIGNATURE-----

 

 

------------=_1240610252-27111-1784

Content-Type: text/plain; name="message-footer.txt"

Content-Disposition: inline; filename="message-footer.txt"

Content-Transfer-Encoding: 8bit

 

To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org

with this subject : unsubscribe security-announce

_______________________________________________________

Want to buy your Pack or Services from Mandriva?

Go to http://www.mandrivastore.com

Join the Club : http://www.mandrivaclub.com

_______________________________________________________

 

------------=_1240610252-27111-1784--

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×