Bug 510110 - clamav: scanner bypass vulnerabilities
clamav: scanner bypass vulnerabilities
Status: CLOSED DUPLICATE of bug 510111
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On:
  Show dependency treegraph
Reported: 2009-07-07 13:51 EDT by Vincent Danen
Modified: 2009-07-07 13:53 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2009-07-07 13:53:34 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2009-07-07 13:51:52 EDT
ClamAV 0.95.2 corrects several scanner bypass vulnerabilities [1] and other issues as well:

* libclamav: detect and handle archives hidden inside other files (eg. images), which can be unpacked by WinZip, WinRAR and other tools (bb#1554) Reported by ROGER Mickael and Thierry Zoller

* libclamav/mspack.c, cab.c: don't rely on file sizes stored in CAB headers (bb#1562) Reported by Thierry*Zoller <Thierry*Zoller.lu>

* libclamunrar/unrarvm.c: fix handling of some broken rar files

* libclamav/mbox.c: handle malformed emails with embedded \0s (bb#1573)

* libclamav/readdb.c: add offset checks (bb#1615)

[1] http://blog.zoller.lu/2009/05/advisory-clamav-generic-bypass.html
Comment 1 Vincent Danen 2009-07-07 13:53:34 EDT

*** This bug has been marked as a duplicate of bug 510111 ***

Note You need to log in before you can comment on or make changes to this bug.