openSUSE Security Update : clamav (openSUSE-2021-555)

high Nessus Plugin ID 148699

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for clamav fixes the following issues :

- CVE-2021-1252: Fix for Excel XLM parser infinite loop.
(bsc#1184532)

- CVE-2021-1404: Fix for PDF parser buffer over-read;
possible crash. (bsc#1184533)

- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)

- Fix errors when scanning files > 4G (bsc#1181256)

- Update clamav.keyring

- Update to 0.103.2

This update was imported from the SUSE:SLE-15:Update update project.

Solution

Update the affected clamav packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1181256

https://bugzilla.opensuse.org/show_bug.cgi?id=1184532

https://bugzilla.opensuse.org/show_bug.cgi?id=1184533

https://bugzilla.opensuse.org/show_bug.cgi?id=1184534

Plugin Details

Severity: High

ID: 148699

File Name: openSUSE-2021-555.nasl

Version: 1.5

Type: local

Agent: unix

Published: 4/16/2021

Updated: 1/4/2024

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2021-1252

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2021-1405

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:clamav, p-cpe:/a:novell:opensuse:clamav-debuginfo, p-cpe:/a:novell:opensuse:clamav-debugsource, p-cpe:/a:novell:opensuse:clamav-devel, p-cpe:/a:novell:opensuse:libclamav9, p-cpe:/a:novell:opensuse:libclamav9-debuginfo, p-cpe:/a:novell:opensuse:libfreshclam2, p-cpe:/a:novell:opensuse:libfreshclam2-debuginfo, cpe:/o:novell:opensuse:15.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 4/15/2021

Vulnerability Publication Date: 4/8/2021

Reference Information

CVE: CVE-2021-1252, CVE-2021-1404, CVE-2021-1405