English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.875200
Category:Fedora Local Security Checks
Title:Fedora Update for clamav FEDORA-2018-1fc39f2d13
Summary:Check the version of clamav
Description:Summary:
Check the version of clamav

Vulnerability Insight:
Clam AntiVirus is an anti-virus toolkit for
UNIX. The main purpose of this software is the integration with mail servers
(attachment scanning). The package provides a flexible and scalable multi-threaded
daemon, a command line scanner, and a tool for automatic updating via Internet.
The programs are based on a shared library distributed with the Clam AntiVirus
package, which you can use with your own software. The virus database is based
on the virus database from OpenAntiVirus, but contains additional signatures
(including signatures for popular polymorphic viruses, too) and is KEPT UP TO DATE.

Affected Software/OS:
clamav on Fedora 27

Solution:
Please install the updated packages.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-6706
http://securitytracker.com/id?1027725
http://telussecuritylabs.com/threats/show/TSL20121207-01
https://bugs.chromium.org/p/project-zero/issues/detail?id=1286
https://community.sophos.com/kb/en-us/118424#six
https://lock.cmpxchg8b.com/sophailv2.pdf
https://nakedsecurity.sophos.com/2012/11/05/tavis-ormandy-sophos/
https://security.gentoo.org/glsa/201708-05
https://security.gentoo.org/glsa/201709-24
https://security.gentoo.org/glsa/201804-16
Common Vulnerability Exposure (CVE) ID: CVE-2017-6419
https://lists.debian.org/debian-lts-announce/2018/02/msg00014.html
https://bugzilla.clamav.net/show_bug.cgi?id=11701
https://github.com/varsleak/varsleak-vul/blob/master/clamav-vul/heap-overflow/clamav_chm_crash.md
https://github.com/vrtadmin/clamav-devel/commit/a83773682e856ad6529ba6db8d1792e6d515d7f1
Debian Security Information: DSA-3946 (Google Search)
http://www.debian.org/security/2017/dsa-3946
Common Vulnerability Exposure (CVE) ID: CVE-2018-0202
https://lists.debian.org/debian-lts-announce/2018/03/msg00011.html
https://usn.ubuntu.com/3592-1/
https://usn.ubuntu.com/3592-2/
Common Vulnerability Exposure (CVE) ID: CVE-2017-6420
https://bugzilla.clamav.net/show_bug.cgi?id=11798
https://github.com/varsleak/varsleak-vul/blob/master/clamav-vul/use-after-free/clamav-use-after-free-pe.md
https://github.com/vrtadmin/clamav-devel/commit/dfc00cd3301a42b571454b51a6102eecf58407bc
Common Vulnerability Exposure (CVE) ID: CVE-2017-6418
https://bugzilla.clamav.net/show_bug.cgi?id=11797
https://github.com/varsleak/varsleak-vul/blob/master/clamav-vul/heap-overflow/clamav_email_crash.md
https://github.com/vrtadmin/clamav-devel/commit/586a5180287262070637c8943f2f7efd652e4a2c
BugTraq ID: 100154
http://www.securityfocus.com/bid/100154
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.