Mandrake Linux Security Advisory : clamav (MDKSA-2005:205)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing one or more security
updates.

Description :

A number of vulnerabilities were discovered in ClamAV versions prior
to 0.87.1 :

The OLE2 unpacker in clamd allows remote attackers to cause a DoS
(segfault) via a DOC file with an invalid property tree
(CVE-2005-3239)

The FSG unpacker allows remote attackers to cause 'memory corruption'
and execute arbitrary code via a crafted FSG 1.33 file (CVE-2005-3303)

The tnef_attachment() function allows remote attackers to cause a DoS
(infinite loop and memory exhaustion) via a crafted value in a CAB
file that causes ClamAV to repeatedly scan the same block
(CVE-2005-3500)

Remote attackers could cause a DoS (infinite loop) via a crafted CAB
file (CVE-2005-3501)

An improper bounds check in petite.c could allow attackers to perform
unknown attacks via unknown vectors (CVE-2005-3587)

This update provides ClamAV 0.87.1 which corrects all of these issues.

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 20439 (mandrake_MDKSA-2005-205.nasl)

Bugtraq ID:

CVE ID: CVE-2005-3239
CVE-2005-3303
CVE-2005-3500
CVE-2005-3501
CVE-2005-3587

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now