Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.56617
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDKSA-2006:067 (clamav)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to clamav
announced via advisory MDKSA-2006:067.

Damian Put discovered an integer overflow in the PE header parser in
ClamAV that could be exploited if the ArchiveMaxFileSize option was
disabled (CVE-2006-1614).

Format strings in the logging code could possibly lead to the execution
of arbitrary code (CVE-2006-1615).

David Luyer found that ClamAV could be tricked into an invalid memory
access in the cli_bitset_set() function, which could lead to a Denial
of Service (CVE-2006-1630).

This update provides ClamAV 0.88.1 which corrects this issue and also
fixes some other bugs.

Affected: 10.2, 2006.0, Corporate 3.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2006:067

Risk factor : Critical

CVSS Score:
10.0

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-1614
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
BugTraq ID: 17388
http://www.securityfocus.com/bid/17388
BugTraq ID: 17951
http://www.securityfocus.com/bid/17951
Bugtraq: 20060406 [Overflow.pl] Clam AntiVirus Win32-UPX Heap Overflow (not default configuration) (Google Search)
http://www.securityfocus.com/archive/1/430405/100/0/threaded
Cert/CC Advisory: TA06-132A
http://www.us-cert.gov/cas/techalerts/TA06-132A.html
Debian Security Information: DSA-1024 (Google Search)
http://www.debian.org/security/2006/dsa-1024
http://www.gentoo.org/security/en/glsa/glsa-200604-06.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:067
http://www.overflow.pl/adv/clamavupxinteger.txt
http://www.osvdb.org/24457
http://securitytracker.com/id?1015887
http://secunia.com/advisories/19534
http://secunia.com/advisories/19536
http://secunia.com/advisories/19564
http://secunia.com/advisories/19567
http://secunia.com/advisories/19570
http://secunia.com/advisories/19608
http://secunia.com/advisories/20077
http://secunia.com/advisories/23719
SuSE Security Announcement: SUSE-SA:2006:020 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Apr/0002.html
http://www.trustix.org/errata/2006/0020
http://www.vupen.com/english/advisories/2006/1258
http://www.vupen.com/english/advisories/2006/1779
XForce ISS Database: clamav-pe-overflow(25660)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25660
Common Vulnerability Exposure (CVE) ID: CVE-2006-1615
http://www.osvdb.org/24458
XForce ISS Database: clamav-output-format-string(25661)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25661
Common Vulnerability Exposure (CVE) ID: CVE-2006-1630
http://www.osvdb.org/24459
XForce ISS Database: clamav-others-dos(25662)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25662
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.