blob: 81f3657dcf4b775c281b8b771365636c8cea1314 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200507-25">
<title>Clam AntiVirus: Integer overflows</title>
Clam AntiVirus is vulnerable to integer overflows when handling several
file formats, potentially resulting in the execution of arbitrary code.
<product type="ebuild">clamav</product>
<announced>July 26, 2005</announced>
<revised>August 11, 2005: 02</revised>
<package name="app-antivirus/clamav" auto="yes" arch="*">
<unaffected range="ge">0.86.2</unaffected>
<vulnerable range="lt">0.86.2</vulnerable>
Clam AntiVirus is a GPL anti-virus toolkit, designed for integration
with mail servers to perform attachment scanning. Clam AntiVirus also
provides a command line scanner and a tool for fetching updates of the
virus database.
Neel Mehta and Alex Wheeler discovered that Clam AntiVirus is
vulnerable to integer overflows when handling the TNEF, CHM and FSG
file formats.
<impact type="high">
By sending a specially-crafted file an attacker could execute arbitrary
code with the permissions of the user running Clam AntiVirus.
There is no known workaround at this time.
All Clam AntiVirus users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.86.2&quot;</code>
<uri link="">CAN-2005-2450</uri>
<uri link="">Clam AntiVirus: Release Notes</uri>
<metadata tag="requester" timestamp="Mon, 25 Jul 2005 17:48:24 +0000">
<metadata tag="submitter" timestamp="Mon, 25 Jul 2005 19:44:22 +0000">
<metadata tag="bugReady" timestamp="Tue, 26 Jul 2005 20:33:43 +0000">