openSUSE Security Update : clamav (openSUSE-SU-2014:1560-1)

Medium Nessus Plugin ID 79754


The remote openSUSE host is missing a security update.


clamav was updated to version 0.98.5 to fix two security issues.

These security issues were fixed :

- Segmentation fault when processing certain files (CVE-2013-6497).

- Heap-based buffer overflow when scanning crypted PE files (CVE-2014-9050).

The following non-security issues were fixed :

- Support for the XDP file format and extracting, decoding, and scanning PDF files within XDP files.

- Addition of shared library support for LLVM versions 3.1
- 3.5 for the purpose of just-in-time(JIT) compilation of ClamAV bytecode signatures.

- Enhancements to the clambc command line utility to assist ClamAV bytecode signature authors by providing introspection into compiled bytecode programs.

- Resolution of many of the warning messages from ClamAV compilation.

- Improved detection of malicious PE files.

- ClamAV 0.98.5 now works with OpenSSL in FIPS compliant mode (bnc#904207).

- Fix server socket setup code in clamd (bnc#903489).

- Change updateclamconf to prefer the state of the old config file even for commented-out options (bnc#903719).


Update the affected clamav packages.

See Also

Plugin Details

Severity: Medium

ID: 79754

File Name: openSUSE-2014-736.nasl

Version: $Revision: 1.2 $

Type: local

Agent: unix

Published: 2014/12/06

Modified: 2014/12/09

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:clamav, p-cpe:/a:novell:opensuse:clamav-debuginfo, p-cpe:/a:novell:opensuse:clamav-debugsource, cpe:/o:novell:opensuse:12.3, cpe:/o:novell:opensuse:13.1, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/11/27

Reference Information

CVE: CVE-2013-6497, CVE-2014-9050

BID: 71178, 71242