blob: 51ea7f651aded8c0e02c13a39de9edbeb5a25ff4 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200802-09">
<title>ClamAV: Multiple vulnerabilities</title>
Multiple vulnerabilities in ClamAV may result in the remote execution of
arbitrary code.
<product type="ebuild">clamav</product>
<announced>February 21, 2008</announced>
<revised>February 21, 2008: 01</revised>
<package name="app-antivirus/clamav" auto="yes" arch="*">
<unaffected range="ge">0.92.1</unaffected>
<vulnerable range="lt">0.92.1</vulnerable>
Clam AntiVirus is a free anti-virus toolkit for UNIX, designed
especially for e-mail scanning on mail gateways.
An integer overflow has been reported in the "cli_scanpe()" function in
file libclamav/pe.c (CVE-2008-0318). Another unspecified vulnerability
has been reported in file libclamav/mew.c (CVE-2008-0728).
<impact type="high">
A remote attacker could entice a user or automated system to scan a
specially crafted file, possibly leading to the execution of arbitrary
code with the privileges of the user running ClamAV (either a system
user or the "clamav" user if clamd is compromised).
There is no known workaround at this time.
All ClamAV users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.92.1&quot;</code>
<uri link="">CVE-2008-0318</uri>
<uri link="">CVE-2008-0728</uri>
<metadata tag="requester" timestamp="Tue, 19 Feb 2008 20:13:32 +0000">
<metadata tag="bugReady" timestamp="Tue, 19 Feb 2008 20:14:59 +0000">
<metadata tag="submitter" timestamp="Tue, 19 Feb 2008 21:50:12 +0000">