Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2006:080: clamav


Vulnerability Assessment Details

MDKSA-2006:080: clamav

Vulnerability Assessment Summary
Check for the version of the clamav package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2006:080 (clamav).



Ulf Harnhammar discovered that the freshclam tool does not do a proper

check for the size of header data received from a web server. This

could potentially permit a specially prepared HTTP server to exploit

freshclam clients connecting to a database mirror and causing a DoS.



The updated packages have been updated to Clamav 0.88.2 which corrects

this problem.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:080
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Vintage DEC PDP-11 /73 Minicomputer with RL02 Drive and Fujitsu Hard Disks
$1700.0
Vintage DEC PDP-11 /73 Minicomputer with RL02 Drive and Fujitsu Hard Disks pictureVintage DEC PDP-11 /34 Minicomputer With Kennedy Tape Drive, J11 CPU, 2 Terminal
$5000.0
Vintage DEC PDP-11 /34 Minicomputer With Kennedy Tape Drive, J11 CPU, 2 Terminal picturemyDOS360 IBM Mainframe on Your PC Software Package - COBOL - FORTRAN
$14.95
myDOS360 IBM Mainframe on Your PC Software Package - COBOL - FORTRAN pictureApple MAC Mainframe II AVATAR 03-0054-E00/EE IBM 3270 Card
$25.0
Apple MAC Mainframe II AVATAR 03-0054-E00/EE IBM 3270 Card picture


Discussions

No Discussions have been posted on this vulnerability.