Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2014.1574.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2014:1574-1)
Summary:The remote host is missing an update for the 'clamav' package(s) announced via the SUSE-SU-2014:1574-1 advisory.
Description:Summary:
The remote host is missing an update for the 'clamav' package(s) announced via the SUSE-SU-2014:1574-1 advisory.

Vulnerability Insight:
clamav was updated to version 0.98.5 to fix three security issues and several non-security issues.

These security issues have been fixed:

* Crash when scanning maliciously crafted yoda's crypter files
(CVE-2013-6497).
* Heap-based buffer overflow when scanning crypted PE files
(CVE-2014-9050).
* Crash when using 'clamscan -a'.

These non-security issues have been fixed:

* Support for the XDP file format and extracting, decoding, and
scanning PDF files within XDP files.
* Addition of shared library support for LLVM versions 3.1 - 3.5 for
the purpose of just-in-time(JIT) compilation of ClamAV bytecode
signatures.
* Enhancements to the clambc command line utility to assist ClamAV
bytecode signature authors by providing introspection into compiled
bytecode programs.
* Resolution of many of the warning messages from ClamAV compilation.
* Improved detection of malicious PE files.
* ClamAV 0.98.5 now works with OpenSSL in FIPS compliant mode
(bnc#904207).
* Fix server socket setup code in clamd (bnc#903489).
* Change updateclamconf to prefer the state of the old config file
even for commented-out options (bnc#903719).
* Fix infinite loop in clamdscan when clamd is not running.
* Fix buffer underruns when handling multi-part MIME email attachments.
* Fix configuration of OpenSSL on various platforms.
* Fix linking issues with libclamunrar.

Security Issues:

* CVE-2013-6497
* CVE-2014-9050

Affected Software/OS:
'clamav' package(s) on SUSE Linux Enterprise Desktop 11-SP3, SUSE Linux Enterprise Server 10-SP4, SUSE Linux Enterprise Server 11-SP3.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-6497
59645
http://secunia.com/advisories/59645
60150
http://secunia.com/advisories/60150
71178
http://www.securityfocus.com/bid/71178
FEDORA-2014-15463
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/144979.html
FEDORA-2014-15473
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/144754.html
MDVSA-2014:217
http://www.mandriva.com/security/advisories?name=MDVSA-2014:217
SUSE-SU-2014:1571
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html
SUSE-SU-2014:1574
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00007.html
USN-2423-1
http://www.ubuntu.com/usn/USN-2423-1
USN-2488-2
http://www.ubuntu.com/usn/USN-2488-2
[oss-security] 20141118 Fwd: [Clamav-devel] ClamAV(R) blog: ClamAV 0.98.5 has been released!
http://www.openwall.com/lists/oss-security/2014/11/19/2
[oss-security] 20141118 Re: Fwd: [Clamav-devel] ClamAV(R) blog: ClamAV 0.98.5 has been released!
http://www.openwall.com/lists/oss-security/2014/11/19/5
clamv-cve20136497os(98804)
https://exchange.xforce.ibmcloud.com/vulnerabilities/98804
http://blog.clamav.net/2014/11/clamav-0985-has-been-released.html
https://bugzilla.clamav.net/show_bug.cgi?id=11088
https://bugzilla.redhat.com/show_bug.cgi?id=1138101
openSUSE-SU-2014:1560
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00003.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-9050
BugTraq ID: 71242
http://www.securityfocus.com/bid/71242
http://www.openwall.com/lists/oss-security/2014/11/22/1
http://www.securitytracker.com/id/1031268
http://secunia.com/advisories/62542
SuSE Security Announcement: SUSE-SU-2014:1571 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:1574 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:1560 (Google Search)
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.