Joined: 12 May 2004
|Posted: Thu Sep 20, 2007 10:26 pm Post subject: [ GLSA 200709-14 ] ClamAV: Multiple vulnerabilities
|Gentoo Linux Security Advisory
Title: ClamAV: Multiple vulnerabilities (GLSA 200709-14)
Date: September 20, 2007
Vulnerabilities have been discovered in ClamAV allowing remote execution of
arbitrary code and Denial of Service attacks.
Clam AntiVirus is an open source (GPL) anti-virus toolkit for UNIX,
designed especially for e-mail scanning on mail gateways.
Vulnerable: < 0.91.2
Unaffected: >= 0.91.2
Architectures: All supported architectures
Nikolaos Rangos discovered a vulnerability in ClamAV which exists
because the recipient address extracted from email messages is not
properly sanitized before being used in a call to "popen()" when
executing sendmail (CVE-2007-4560). Also, NULL-pointer dereference
errors exist within the "cli_scanrtf()" function in libclamav/rtf.c and
Stefanos Stamatis discovered a NULL-pointer dereference vulnerability
within the "cli_html_normalise()" function in libclamav/htmlnorm.c
The unsanitized recipient address can be exploited to execute arbitrary
code with the privileges of the clamav-milter process by sending an
email with a specially crafted recipient address to the affected
system. Also, the NULL-pointer dereference errors can be exploited to
crash ClamAV. Successful exploitation of the latter vulnerability
requires that clamav-milter is started with the "black hole" mode
activated, which is not enabled by default.
There is no known workaround at this time.
All ClamAV users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.91.2"
Last edited by GLSA on Wed Jun 09, 2010 4:25 am; edited 4 times in total