Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200507-25] Clam AntiVirus: Integer overflows


Vulnerability Assessment Details

[GLSA-200507-25] Clam AntiVirus: Integer overflows

Vulnerability Assessment Summary
Clam AntiVirus: Integer overflows

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200507-25
(Clam AntiVirus: Integer overflows)


Neel Mehta and Alex Wheeler discovered that Clam AntiVirus is
vulnerable to integer overflows when handling the TNEF, CHM and FSG
file formats.

Impact

By sending a specially-crafted file a possible hacker could execute
arbitrary code with the permissions of the user running Clam AntiVirus.

Workaround

There is no known workaround at this time.

References:
http://www.securityfocus.com/archive/1/406377/30/
http://sourceforge.net/project/shownotes.php?release_id=344514


Solution:
All Clam AntiVirus users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.86.2"


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

Sun Sparc T5120 8 Core 1.4GHZ 16GB Ram 2x146GB HDD, With Rails
$175.0
Sun Sparc T5120 8 Core 1.4GHZ 16GB Ram 2x146GB HDD, With Rails pictureSun Sparc T5220 8Core 1.2GHZ 32GB Ram, NO HDD
$95.0
Sun Sparc T5220 8Core 1.2GHZ 32GB Ram, NO HDD pictureDell PowerEdge R710 2x X5550 2.66GHz Quad Core 128GB 8x 300GB 15K SAS PERC 6/i
$1487.0
Dell PowerEdge R710 2x X5550 2.66GHz Quad Core 128GB 8x 300GB 15K SAS PERC 6/i picture


Discussions

No Discussions have been posted on this vulnerability.