- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201412-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
    Title: Clam AntiVirus: Denial of service
     Date: December 09, 2014
     Bugs: #529728
       ID: 201412-05

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
=======
A vulnerability in Clam AntiVirus can lead to a Denial of Service
condition.

Background
=========
Clam AntiVirus is an open source (GPL) anti-virus toolkit for UNIX,
designed especially for e-mail scanning on mail gateways.

Affected packages
================
    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  app-antivirus/clamav         < 0.98.5                  >= 0.98.5

Description
==========
A heap-based buffer overflow exists in the cli_scanpe function in
libclamav/pe.c in ClamAV.

Impact
=====
A remote attacker could possibly cause a Denial of Service condition
via a specially crafted file.

Workaround
=========
There is no known workaround at this time.

Resolution
=========
All Clam AntiVirus users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.98.5"

References
=========
[ 1 ] CVE-2014-9050
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9050

Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201412-05

Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5/

Gentoo: GLSA-201412-05: Clam AntiVirus: Denial of service

A vulnerability in Clam AntiVirus can lead to a Denial of Service condition.

Summary

A heap-based buffer overflow exists in the cli_scanpe function in libclamav/pe.c in ClamAV.

Resolution

All Clam AntiVirus users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.98.5"

References

[ 1 ] CVE-2014-9050 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9050

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201412-05

Concerns

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

Severity
Severity: Normal
Title: Clam AntiVirus: Denial of service
Date: December 09, 2014
Bugs: #529728
ID: 201412-05

Synopsis

A vulnerability in Clam AntiVirus can lead to a Denial of Service condition.

Background

Clam AntiVirus is an open source (GPL) anti-virus toolkit for UNIX, designed especially for e-mail scanning on mail gateways.

Affected Packages

------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-antivirus/clamav < 0.98.5 >= 0.98.5

Impact

===== A remote attacker could possibly cause a Denial of Service condition via a specially crafted file.

Workaround

There is no known workaround at this time.

Related News