To: [email protected]Subject: [ MDKSA-2006:067 ] - Updated clamav packages fix vulnerabilities
Date: Fri, 7 Apr 2006 15:25:00 -0600
From: [email protected]
Reply-To: <xsecurity@mandriva.com.>
Message-Id: <E1FRyRw-0001IS-9k@mercury.mandriva.com.>
Sender: QATeam User <qateam@mercury.mandriva.com.>
X-Virus-Scanned: antivirus-gw at tyumen.ru
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2006:067
http://www.mandriva.com/security/
_______________________________________________________________________
Package : clamav
Date : April 7, 2006
Affected: 10.2, 2006.0, Corporate 3.0
_______________________________________________________________________
Problem Description:
Damian Put discovered an integer overflow in the PE header parser in
ClamAV that could be exploited if the ArchiveMaxFileSize option was
disabled (CVE-2006-1614).
Format strings in the logging code could possibly lead to the execution
of arbitrary code (CVE-2006-1615).
David Luyer found that ClamAV could be tricked into an invalid memory
access in the cli_bitset_set() function, which could lead to a Denial
of Service (CVE-2006-1630).
This update provides ClamAV 0.88.1 which corrects this issue and also
fixes some other bugs.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1614http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1615http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1630
_______________________________________________________________________
Updated Packages:
Mandriva Linux 10.2:
78af90cdd26037ecc4753cc223ef1b46 10.2/RPMS/clamav-0.88.1-0.1.102mdk.i586.rpm
386742ea0d3fa49e7d4116c883632c40 10.2/RPMS/clamav-db-0.88.1-0.1.102mdk.i586.rpm
162bac111e036526638c9556404f84ef 10.2/RPMS/clamav-milter-0.88.1-0.1.102mdk.i586.rpm
790cae6bca4f206d0d41ccdc9aab4172 10.2/RPMS/clamd-0.88.1-0.1.102mdk.i586.rpm
f4ec987f6de8dbe0fa0a370a8513576c 10.2/RPMS/libclamav1-0.88.1-0.1.102mdk.i586.rpm
4cf47fde81840efb4c17e24181587fad 10.2/RPMS/libclamav1-devel-0.88.1-0.1.102mdk.i586.rpm
4ae4f91cb63670f018c84644685708d1 10.2/SRPMS/clamav-0.88.1-0.1.102mdk.src.rpm
Mandriva Linux 10.2/X86_64:
d67ab22811cc7329d889fd2953ff98e4 x86_64/10.2/RPMS/clamav-0.88.1-0.1.102mdk.x86_64.rpm
1750f5d9e63d9e37a170114cee64fe7f x86_64/10.2/RPMS/clamav-db-0.88.1-0.1.102mdk.x86_64.rpm
28310e3fb5eba18cb1312591ee94b747 x86_64/10.2/RPMS/clamav-milter-0.88.1-0.1.102mdk.x86_64.rpm
afa8503930c109873deb561d0bf19637 x86_64/10.2/RPMS/clamd-0.88.1-0.1.102mdk.x86_64.rpm
90b6e2108b96abc940309dbdf277c15b x86_64/10.2/RPMS/lib64clamav1-0.88.1-0.1.102mdk.x86_64.rpm
53b7e0d8aa707a2679121c1ee3e3a68d x86_64/10.2/RPMS/lib64clamav1-devel-0.88.1-0.1.102mdk.x86_64.rpm
4ae4f91cb63670f018c84644685708d1 x86_64/10.2/SRPMS/clamav-0.88.1-0.1.102mdk.src.rpm
Mandriva Linux 2006.0:
604deb9acc669892e83889e21003da72 2006.0/RPMS/clamav-0.88.1-0.1.20060mdk.i586.rpm
130c0cd5592f794dff01c816da87a22c 2006.0/RPMS/clamav-db-0.88.1-0.1.20060mdk.i586.rpm
c70b05eb926c8de70e8c61404ffe878d 2006.0/RPMS/clamav-milter-0.88.1-0.1.20060mdk.i586.rpm
744662b01972ca7d4e8cf319778f5e70 2006.0/RPMS/clamd-0.88.1-0.1.20060mdk.i586.rpm
b33e83e43cf31b1cf8b01d4ae0140cb6 2006.0/RPMS/libclamav1-0.88.1-0.1.20060mdk.i586.rpm
494e3c588012bb49c7539379a1ed7d04 2006.0/RPMS/libclamav1-devel-0.88.1-0.1.20060mdk.i586.rpm
ee0dad2e6693a49018772d523b31caf7 2006.0/SRPMS/clamav-0.88.1-0.1.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64:
9ed21b8dfaf3cc0e97642c01a60cb77e x86_64/2006.0/RPMS/clamav-0.88.1-0.1.20060mdk.x86_64.rpm
6c9774f949aa4d6543fe73465fa18fd3 x86_64/2006.0/RPMS/clamav-db-0.88.1-0.1.20060mdk.x86_64.rpm
7da7ff8ca78611296e2a9deeb13f3c21 x86_64/2006.0/RPMS/clamav-milter-0.88.1-0.1.20060mdk.x86_64.rpm
0cdd6ea74f17fb4179d86005a0ee74a0 x86_64/2006.0/RPMS/clamd-0.88.1-0.1.20060mdk.x86_64.rpm
e029708922271f57d28fb04fbfbc670e x86_64/2006.0/RPMS/lib64clamav1-0.88.1-0.1.20060mdk.x86_64.rpm
0c6075c66b0fc5aa791d661e4b356f7e x86_64/2006.0/RPMS/lib64clamav1-devel-0.88.1-0.1.20060mdk.x86_64.rpm
ee0dad2e6693a49018772d523b31caf7 x86_64/2006.0/SRPMS/clamav-0.88.1-0.1.20060mdk.src.rpm
Corporate 3.0:
338f4fde8dc1b3c025a0aafe7e3f1d16 corporate/3.0/RPMS/clamav-0.88.1-0.1.C30mdk.i586.rpm
0b103f86de58322decb7eab357ae8303 corporate/3.0/RPMS/clamav-db-0.88.1-0.1.C30mdk.i586.rpm
872ff963443a695f7339925e17751fb4 corporate/3.0/RPMS/clamav-milter-0.88.1-0.1.C30mdk.i586.rpm
4398815889ab571ef8a88aaa1cd96d0c corporate/3.0/RPMS/clamd-0.88.1-0.1.C30mdk.i586.rpm
422f5145947d02532671885b115a6ef6 corporate/3.0/RPMS/libclamav1-0.88.1-0.1.C30mdk.i586.rpm
8b14d93a15408fb129c66d1395c3595c corporate/3.0/RPMS/libclamav1-devel-0.88.1-0.1.C30mdk.i586.rpm
ad723ef00c23c3b8c36be5aee40abb15 corporate/3.0/SRPMS/clamav-0.88.1-0.1.C30mdk.src.rpm
Corporate 3.0/X86_64:
01fd41e817e1d96789b1b9dc43cbd760 x86_64/corporate/3.0/RPMS/clamav-0.88.1-0.1.C30mdk.x86_64.rpm
434648110ef5603f85049ae02e44b7e4 x86_64/corporate/3.0/RPMS/clamav-db-0.88.1-0.1.C30mdk.x86_64.rpm
10a1d45e5d53d170112b1698fcdb66ba x86_64/corporate/3.0/RPMS/clamav-milter-0.88.1-0.1.C30mdk.x86_64.rpm
c1f38d2e0d753997b096c5e0fbf4f575 x86_64/corporate/3.0/RPMS/clamd-0.88.1-0.1.C30mdk.x86_64.rpm
b1bd0032ab359f4a25b48675df76e1be x86_64/corporate/3.0/RPMS/lib64clamav1-0.88.1-0.1.C30mdk.x86_64.rpm
bc9dfa91d651edaf6957def3c502ec21 x86_64/corporate/3.0/RPMS/lib64clamav1-devel-0.88.1-0.1.C30mdk.x86_64.rpm
ad723ef00c23c3b8c36be5aee40abb15 x86_64/corporate/3.0/SRPMS/clamav-0.88.1-0.1.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFENquymqjQ0CJFipgRAv1PAKDWy48nobAGlEt7Zy8IYnosPSt52ACgj2jv
itI9Qf3vHSG+ead8P1Sjzvc=
=Nzey
-----END PGP SIGNATURE-----