summaryrefslogtreecommitdiffstats
path: root/data/DTSA/advs/3-clamav.adv
diff options
context:
space:
mode:
authorNeil McGovern <neilm@debian.org>2005-09-03 14:41:30 +0000
committerNeil McGovern <neilm@debian.org>2005-09-03 14:41:30 +0000
commit10c833823154e563f6cd75eccc02e45717cb5e90 (patch)
tree4f40cffee44f1f1052e84dd083f0d24c780d66f1 /data/DTSA/advs/3-clamav.adv
parent23a17f869790f20c72b172b9c15f658f0236950d (diff)
Added some .advs
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@1796 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/DTSA/advs/3-clamav.adv')
-rw-r--r--data/DTSA/advs/3-clamav.adv44
1 files changed, 44 insertions, 0 deletions
diff --git a/data/DTSA/advs/3-clamav.adv b/data/DTSA/advs/3-clamav.adv
new file mode 100644
index 0000000000..d6169b049e
--- /dev/null
+++ b/data/DTSA/advs/3-clamav.adv
@@ -0,0 +1,44 @@
+dtsa: DTSA-3-1
+source: clamav
+date: August 28th, 2005
+author: Joey Hess
+vuln-type: denial of service and privilege escalation
+problem-scope: remote
+debian-specific: no
+cve: CAN-2005-2070 CAN-2005-1923 CAN-2005-2056 CAN-2005-1922 CAN-2005-2450
+testing-fix: 0.86.2-4etch1
+sid-fix: 0.86.2-1
+
+Multiple security holes were found in clamav:
+
+CAN-2005-2070
+
+ The ClamAV Mail fILTER (clamav-milter), when used in Sendmail using long
+ timeouts, allows remote attackers to cause a denial of service by keeping
+ an open connection, which prevents ClamAV from reloading.
+
+CAN-2005-1923
+
+ The ENSURE_BITS macro in mszipd.c for Clam AntiVirus (ClamAV) allows remote
+ attackers to cause a denial of service (CPU consumption by infinite loop)
+ via a cabinet (CAB) file with the cffile_FolderOffset field set to 0xff,
+ which causes a zero-length read.
+
+CAN-2005-2056
+
+ The Quantum archive decompressor in Clam AntiVirus (ClamAV) allows remote
+ attackers to cause a denial of service (application crash) via a crafted
+ Quantum archive.
+
+CAN-2005-1922
+
+ The MS-Expand file handling in Clam AntiVirus (ClamAV) allows remote
+ attackers to cause a denial of service (file descriptor and memory
+ consumption) via a crafted file that causes repeated errors in the
+ cli_msexpand function.
+
+CAN-2005-2450
+
+ Multiple integer overflows in the (1) TNEF, (2) CHM, or (3) FSG file
+ format processors in libclamav for Clam AntiVirus (ClamAV) allow remote
+ attackers to gain privileges via a crafted e-mail message.

© 2014-2024 Faster IT GmbH | imprint | privacy policy