Joined: 12 May 2004
|Posted: Tue Jul 26, 2005 9:01 pm Post subject: [ GLSA 200507-25 ] Clam AntiVirus: Integer overflows
|Gentoo Linux Security Advisory
Title: Clam AntiVirus: Integer overflows (GLSA 200507-25)
Date: July 26, 2005
Updated: August 11, 2005
Clam AntiVirus is vulnerable to integer overflows when handling several file formats, potentially resulting in the execution of arbitrary code.
Clam AntiVirus is a GPL anti-virus toolkit, designed for integration with mail servers to perform attachment scanning. Clam AntiVirus also provides a command line scanner and a tool for fetching updates of the virus database.
Vulnerable: < 0.86.2
Unaffected: >= 0.86.2
Architectures: All supported architectures
Neel Mehta and Alex Wheeler discovered that Clam AntiVirus is vulnerable to integer overflows when handling the TNEF, CHM and FSG file formats.
By sending a specially-crafted file an attacker could execute arbitrary code with the permissions of the user running Clam AntiVirus.
There is no known workaround at this time.
All Clam AntiVirus users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.86.2"
Clam AntiVirus: Release Notes
Last edited by GLSA on Sun May 07, 2006 4:58 pm; edited 1 time in total