Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 09 Dec 2013 12:50:07 +0400
From: Sergey Popov <>
Subject: Re: CVE request: ClamAV vulnerabilities

29.11.2013 21:58, Kurt Seifried пишет:
> On 11/29/2013 02:20 AM, Sergey Popov wrote:
>> It's a bit late, but i would like to request CVE for two
>> vulnerabilities, that present in ClamAV before 0.97.7[1]:
>> 1) A double-free error exists within the
>> "unrar_extract_next_prepare()" function
>> (libclamunrar_iface/unrar_iface.c) when parsing a RAR file.
>> 2) An unspecified error within the "wwunpack()" function
>> (libclamav/wwunpack.c) when unpacking a WWPack file can be
>> exploited to corrupt heap memory.
>> [1] -
> The blog entry
> contains no mention of security flaws,
> Also the ChangeLog:
> Doesn't contain any mention of the above flaws. Can you provide links
> to source code/bug reports or something so I can verify this? Thanks.

What's about:

"ClamAV 0.97.7 addresses several reported potential security bugs.
Thanks to Felix Groebert, Mateusz Jurczyk and Gynvael Coldwind of the
Google Security Team for finding and reporting these issues."[1]

I know that there are no details provided here, but secunia advisory
also points on 'unspecified vulnerabilities'.

[1] - quote from

Best regards, Sergey Popov
Gentoo developer
Gentoo Desktop Effects project lead
Gentoo Qt project lead
Gentoo Proxy maintainers project lead

Download attachment "signature.asc" of type "application/pgp-signature" (556 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.