[SECURITY] [DSA 947-2] New clamav packages fix heap overflow

ID DEBIAN:DSA-947-2:32B36
Type debian
Reporter Debian
Modified 2006-01-25T00:00:00


Debian Security Advisory DSA 947-2 security@debian.org http://www.debian.org/security/ Michael Stone January 25th, 2006 http://www.debian.org/security/faq

Package : clamav Vulnerability : heap overflow Problem type : remote Debian-specific: no CVE IDs : CVE-2006-0162 Debian Bug : 320014

A heap overflow has been discovered in ClamAV, a virus scanner, which could allow an attacker to execute arbitrary code by sending a carefully crafted UPX-encoded executable to a system runnig ClamAV. In addition, other potential overflows have been corrected.

Packages for the ARM architecture were not available when DSA 947-1 was released; these packages are now available. Also, DSA 947-1 incorrectly identified the package version which corrected these issues in the unstable distribution (sid).

The old stable distribution (woody) does not include ClamAV.

For the stable distribution (sarge) this problem has been fixed in version 0.84-2.sarge.7.

For the unstable distribution (sid) this problem has been fixed in version 0.88-1.

We recommend that you upgrade your clamav package immediately.

Upgrade Instructions

wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update will update the internal database apt-get upgrade will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge

ARM architecture:

  Size/MD5 checksum:    63830 8fcc1f60dffe350cc1138f5217992032
  Size/MD5 checksum:    39510 10528078333fbf18bfc3a200d23b977b
  Size/MD5 checksum:  2171192 d45c061628d87b24bab8516564d7e1c0
  Size/MD5 checksum:    37310 abd9c3c02bf89e8eea072d66f01363eb
  Size/MD5 checksum:   174662 2f8277ebe9debd8bf8c997e66999cf82
  Size/MD5 checksum:   249490 e766e1d75c97b14b086ce0413b2c9cac

These files will probably be moved into the stable distribution on its next update.

For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>