Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 23 Apr 2009 15:40:48 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: Marcus Meissner <meissner@...e.de>
cc: oss-security@...ts.openwall.com, coley@...re.org
Subject: Re: CVE request: clamav clamd and clamscan DoS and
 bypass by malformated archive


======================================================
Name: CVE-2009-1371
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1371
Reference: CONFIRM:http://svn.clamav.net/websvn/filedetails.php?repname=clamav-devel&path=%2Ftrunk%2FChangeLog&rev=5032
Reference: CONFIRM:https://launchpad.net/bugs/360502
Reference: CONFIRM:https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1552
Reference: UBUNTU:USN-756-1
Reference: URL:http://www.ubuntu.com/usn/usn-756-1
Reference: BID:34446
Reference: URL:http://www.securityfocus.com/bid/34446
Reference: OSVDB:53602
Reference: URL:http://osvdb.org/53602
Reference: SECTRACK:1022028
Reference: URL:http://www.securitytracker.com/id?1022028
Reference: SECUNIA:34612
Reference: URL:http://secunia.com/advisories/34612
Reference: SECUNIA:34654
Reference: URL:http://secunia.com/advisories/34654
Reference: VUPEN:ADV-2009-0985
Reference: URL:http://www.vupen.com/english/advisories/2009/0985

The CLI_ISCONTAINED macro in libclamav/others.h in ClamAV before
0.95.1 allows remote attackers to cause a denial of service
(application crash) via a malformed file with UPack encoding.


======================================================
Name: CVE-2009-1372
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1372
Reference: CONFIRM:http://svn.clamav.net/websvn/filedetails.php?repname=clamav-devel&path=%2Ftrunk%2FChangeLog&rev=5032
Reference: CONFIRM:https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1553
Reference: BID:34446
Reference: URL:http://www.securityfocus.com/bid/34446
Reference: OSVDB:53603
Reference: URL:http://osvdb.org/53603
Reference: SECTRACK:1022028
Reference: URL:http://www.securitytracker.com/id?1022028
Reference: SECUNIA:34612
Reference: URL:http://secunia.com/advisories/34612
Reference: VUPEN:ADV-2009-0985
Reference: URL:http://www.vupen.com/english/advisories/2009/0985

Stack-based buffer overflow in the cli_url_canon function in
libclamav/phishcheck.c in ClamAV before 0.95.1 allows remote attackers
to cause a denial of service (application crash) and possibly execute
arbitrary code via a crafted URL.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.