Joined: 12 May 2004
|Posted: Tue Jul 26, 2005 9:01 pm Post subject: [ GLSA 200507-25 ] Clam AntiVirus: Integer overflows
|Gentoo Linux Security Advisory
Title: Clam AntiVirus: Integer overflows (GLSA 200507-25)
Date: July 26, 2005
Updated: August 11, 2005
Clam AntiVirus is vulnerable to integer overflows when handling several
file formats, potentially resulting in the execution of arbitrary code.
Clam AntiVirus is a GPL anti-virus toolkit, designed for integration
with mail servers to perform attachment scanning. Clam AntiVirus also
provides a command line scanner and a tool for fetching updates of the
Vulnerable: < 0.86.2
Unaffected: >= 0.86.2
Architectures: All supported architectures
Neel Mehta and Alex Wheeler discovered that Clam AntiVirus is
vulnerable to integer overflows when handling the TNEF, CHM and FSG
By sending a specially-crafted file an attacker could execute arbitrary
code with the permissions of the user running Clam AntiVirus.
There is no known workaround at this time.
All Clam AntiVirus users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.86.2"
Clam AntiVirus: Release Notes
Last edited by GLSA on Fri May 09, 2014 4:20 am; edited 3 times in total