Summary: | app-antivirus/clamav 0.86.2 fixes integer overflows | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sune Kloppenborg Jeppesen (RETIRED) <jaervosz> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | critical | CC: | antivirus, net-mail+disabled, reb |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.securityfocus.com/archive/1/406377/30/ | ||
Whiteboard: | A1 [glsa] jaervosz | ||
Package list: | Runtime testing required: | --- |
Description
Sune Kloppenborg Jeppesen (RETIRED)
2005-07-24 22:21:28 UTC
net-mail/antivirus please advise and provide an updated ebuild if needed. I'm not sure how easy these are to exploit, not much detail provided. Eh, I have committed the ebuild first thing this morning, when I found sf.net release announce in my mail, before reading this bug. So, there goes, unstable for all used arches. :) Looks like the third mentioned overflow would be easy to exploit, since all it takes is wrong value in headers of incoming data. Second one should be exploitable as well, judging from the code, since it deals with too long filename. As for the first mentioned changelog entry, it's some sort of boundary checking, but I don't know clamav code too well, so I couldn't say whether it was something with internal data, or with outside data. *** Bug 100248 has been marked as a duplicate of this bug. *** Arches please test and mark stable. Stable on hppa Stable on amd64. sparc stable. ppc stable x86 happy stable on ppc64 Stable on alpha, bug 100178. Thx kloeri GLSA 200507-25 |