A denial of service flaw was found in the way the bytecode engine of the Clam Antivirus scanner handled recursion level when scanning an unpacked file. If a local user was tricked into scanning a file or directory with 'load bytecode from the database' feature enabled, it could lead to clamscan executable crash. References: [1] https://bugs.gentoo.org/show_bug.cgi?id=387521 [2] http://www.openwall.com/lists/oss-security/2011/10/18/1 [3] http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=clamav-0.97.3 Upstream patch: [4] http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=3d664817f6ef833a17414a4ecea42004c35cc42f
This issue affects the versions of the clamav package, as shipped with Fedora release of 14 and 15. Please schedule an update. -- This issue affects the versions of the clamav package, as present within EPEL 4, EPEL 5 and EPEL 6 repositories. Please schedule an update.
Created clamav tracking bugs for this issue Affects: fedora-all [bug 746989] Affects: epel-all [bug 746990]
This was assigned CVE-2011-3627: http://www.openwall.com/lists/oss-security/2011/10/18/14