blob: fdc7215de9d4cc2c0a62ef134a2d96278f5a7df5 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200404-07">
<title>ClamAV RAR Archive Remote Denial Of Service Vulnerability</title>
ClamAV is vulnerable to a denial of service attack when processing certain
RAR archives.
<product type="ebuild">clamav</product>
<announced>April 07, 2004</announced>
<revised>May 22, 2006: 02</revised>
<package name="app-antivirus/clamav" auto="yes" arch="*">
<unaffected range="ge">0.68.1</unaffected>
<vulnerable range="le">0.68</vulnerable>
From <uri link=""></uri> :
"Clam AntiVirus is a GPL anti-virus toolkit for UNIX. The main purpose
of this software is the integration with mail servers (attachment
scanning). The package provides a flexible and scalable multi-threaded
daemon, a command line scanner, and a tool for automatic updating via
Internet. The programs are based on a shared library distributed with
the Clam AntiVirus package, which you can use with your own software.
Most importantly, the virus database is kept up to date."
Certain types of RAR archives, including those created by variants of
the W32.Beagle.A@mm worm, may cause clamav to crash when it attempts to
process them.
<impact type="normal">
This vulnerability causes a Denial of Service in the clamav process.
Depending on configuration, this may cause dependent services such as
mail to fail as well.
A workaround is not currently known for this issue. All users are
advised to upgrade to the latest version of the affected package.
ClamAV users should upgrade to version 0.68.1 or later:
# emerge sync
# emerge -pv &quot;&gt;=app-antivirus/clamav-0.68.1&quot;
# emerge &quot;&gt;=app-antivirus/clamav-0.68.1&quot;</code>
<uri link="">CVE-2004-1909</uri>
<metadata tag="submitter">