Bug 510108 - clamav: scanner bypass vulnerabilities
Summary: clamav: scanner bypass vulnerabilities
Keywords:
Status: CLOSED DUPLICATE of bug 510111
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-07-07 17:50 UTC by Vincent Danen
Modified: 2019-09-29 12:30 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2009-07-07 17:54:16 UTC
Embargoed:


Attachments (Terms of Use)

Description Vincent Danen 2009-07-07 17:50:02 UTC
ClamAV 0.95.2 corrects several scanner bypass vulnerabilities [1] and other issues as well:

* libclamav: detect and handle archives hidden inside other files (eg. images), which can be unpacked by WinZip, WinRAR and other tools (bb#1554) Reported by ROGER Mickael and Thierry Zoller

* libclamav/mspack.c, cab.c: don't rely on file sizes stored in CAB headers (bb#1562) Reported by Thierry*Zoller <Thierry*Zoller.lu>

* libclamunrar/unrarvm.c: fix handling of some broken rar files

* libclamav/mbox.c: handle malformed emails with embedded \0s (bb#1573)

* libclamav/readdb.c: add offset checks (bb#1615)

[1] http://blog.zoller.lu/2009/05/advisory-clamav-generic-bypass.html

Comment 1 Vincent Danen 2009-07-07 17:54:16 UTC

*** This bug has been marked as a duplicate of bug 510111 ***


Note You need to log in before you can comment on or make changes to this bug.