Description: | Description:
The remote host is missing updates announced in advisory TSLSA-2007-0013.
clamav < TSL 3.0.5 > < TSL 3.0 > < TSL 2.2 > - New Upstream. - SECURITY Fix: A file descriptor leak error in the chm_decompress_stream() [libclamav/chmunpack.c] function, which could be exploited by attackers to crash an affected system via a specially crafted CHM file. - A buffer overflow error in the cab_unstore() [libclamav/cab.c] function when processing a negative value read from a CAB file, which could be exploited by attackers to crash an affected application or compromise a vulnerable system via a specially crafted CAB file.
The Common Vulnerabilities and Exposures project has assigned the names CVE-2007-1745 and CVE-2007-1997 to these issues.
freeradius < TSL 3.0.5 > < TSL 3.0 > - New upstream. - SECURITY Fix: A security issue has been reported in FreeRADIUS, caused due to a memory leak within the handling of certain malformed diameter format values inside an EAP-TTLS tunnel. This can be exploited to exhaust all available memory by sending a large number of malformed authentication requests to a vulnerable server.
The Common Vulnerabilities and Exposures project has assigned the name CVE-2007-2028 to this issue.
freetype < TSL 3.0.5 > < TSL 3.0 > < TSL 2.2 > - SECURITY Fix: A vulnerability has been reported in FreeType, caused due to an integer overflow when parsing BDF fonts. This can be exploited to cause a heap-based buffer overflow via a specially crafted BDF font.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007-1351 to this issue.
Solution: Update your system with the packages as indicated in the referenced security advisory.
http://www.securityspace.com/smysecure/catid.html?in=TSLSA-2007-0013
Risk factor : Critical
CVSS Score: 8.5
|