GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue May 02, 2006 8:26 pm Post subject: [ GLSA 200605-03 ] ClamAV: Buffer overflow in Freshclam |
|
|
Gentoo Linux Security Advisory
Title: ClamAV: Buffer overflow in Freshclam (GLSA 200605-03)
Severity: normal
Exploitable: remote
Date: May 02, 2006
Bug(s): #131791
ID: 200605-03
Synopsis
Freshclam is vulnerable to a buffer overflow that could lead to execution of arbitrary code.
Background
ClamAV is a GPL virus scanner. Freshclam is a utility to download virus signature updates.
Affected Packages
Package: app-antivirus/clamav
Vulnerable: < 0.88.2
Unaffected: >= 0.88.2
Architectures: All supported architectures
Description
Ulf Harnhammar and an anonymous German researcher discovered that Freshclam fails to check the size of the header data returned by a webserver.
Impact
By enticing a user to connect to a malicious webserver an attacker could cause the execution of arbitrary code.
Workaround
There is no known workaround at this time.
Resolution
All ClamAV users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88.2" |
References
CVE-2006-1989
Last edited by GLSA on Thu May 31, 2007 4:17 am; edited 3 times in total |
|