ID SUSE_11_1_CLAMAV-101206.NASL Type nessus Reporter This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2011-05-05T00:00:00
Description
Upgrade to version clamav 0.96.5 to fix :
CVE-2010-4260: CVSS v2 Base Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P): Denial of service bugs
while parsing PDFs.
CVE-2010-4261: CVSS v2 Base Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P): Memory corruption due to
an off-by-one error within the icon_cb() function.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update clamav-3644.
#
# The text description of this plugin is (C) SUSE LLC.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(53653);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2010-4260", "CVE-2010-4261");
script_name(english:"openSUSE Security Update : clamav (openSUSE-SU-2010:1041-1)");
script_summary(english:"Check for the clamav-3644 patch");
script_set_attribute(
attribute:"synopsis",
value:"The remote openSUSE host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Upgrade to version clamav 0.96.5 to fix :
- CVE-2010-4260: CVSS v2 Base Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P): Denial of service bugs
while parsing PDFs.
- CVE-2010-4261: CVSS v2 Base Score: 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P): Memory corruption due to
an off-by-one error within the icon_cb() function."
);
script_set_attribute(
attribute:"see_also",
value:"http://cve.mitre.org/cgi-bin/cvename.cgi?name=none"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=656548"
);
script_set_attribute(
attribute:"see_also",
value:"https://lists.opensuse.org/opensuse-updates/2010-12/msg00024.html"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected clamav packages."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:clamav");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:clamav-db");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:11.1");
script_set_attribute(attribute:"patch_publication_date", value:"2010/12/06");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/05/05");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE11\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "11.1", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
flag = 0;
if ( rpm_check(release:"SUSE11.1", reference:"clamav-0.96.5-0.1.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"clamav-db-0.96.5-0.1.1") ) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "clamav");
}
{"id": "SUSE_11_1_CLAMAV-101206.NASL", "bulletinFamily": "scanner", "title": "openSUSE Security Update : clamav (openSUSE-SU-2010:1041-1)", "description": "Upgrade to version clamav 0.96.5 to fix :\n\n - CVE-2010-4260: CVSS v2 Base Score: 5.0\n (AV:N/AC:L/Au:N/C:N/I:N/A:P): Denial of service bugs\n while parsing PDFs.\n\n - CVE-2010-4261: CVSS v2 Base Score: 5.0\n (AV:N/AC:L/Au:N/C:N/I:N/A:P): Memory corruption due to\n an off-by-one error within the icon_cb() function.", "published": "2011-05-05T00:00:00", "modified": "2011-05-05T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/53653", "reporter": "This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://lists.opensuse.org/opensuse-updates/2010-12/msg00024.html", "https://bugzilla.novell.com/show_bug.cgi?id=656548", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=none"], "cvelist": ["CVE-2010-4261", "CVE-2010-4260"], "type": "nessus", "lastseen": "2021-01-17T14:04:14", "edition": 24, "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2010-4261", "CVE-2010-4260"]}, {"type": "fedora", "idList": ["FEDORA:9FB0E20B43", "FEDORA:9E58C10FE3D", "FEDORA:9A557110A85", "FEDORA:0BC23110B05", "FEDORA:B214B10F875", "FEDORA:E7E4811074C"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310831280", "OPENVAS:1361412562310840546", "OPENVAS:1361412562310862708", "OPENVAS:831280", "OPENVAS:863427", "OPENVAS:862740", "OPENVAS:1361412562310862740", "OPENVAS:1361412562310863427", "OPENVAS:840546", "OPENVAS:862708"]}, {"type": "nessus", "idList": ["UBUNTU_USN-1031-1.NASL", "SUSE_11_2_CLAMAV-101206.NASL", "SUSE_11_CLAMAV-101206.NASL", "SUSE_CLAMAV-7274.NASL", "CLAMAV_0_96_5.NASL", "SUSE_11_3_CLAMAV-101206.NASL", "MANDRIVA_MDVSA-2010-249.NASL", "FEDORA_2010-18564.NASL", "FEDORA_2010-18568.NASL", "SUSE9_12666.NASL"]}, {"type": "ubuntu", "idList": ["USN-1031-1"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:11288", "SECURITYVULNS:DOC:25276", "SECURITYVULNS:VULN:11518", "SECURITYVULNS:DOC:25963"]}, {"type": "gentoo", "idList": ["GLSA-201110-20"]}], "modified": "2021-01-17T14:04:14", "rev": 2}, "score": {"value": 5.5, "vector": "NONE", "modified": "2021-01-17T14:04:14", "rev": 2}, "vulnersScore": 5.5}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update clamav-3644.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(53653);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\");\n\n script_name(english:\"openSUSE Security Update : clamav (openSUSE-SU-2010:1041-1)\");\n script_summary(english:\"Check for the clamav-3644 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Upgrade to version clamav 0.96.5 to fix :\n\n - CVE-2010-4260: CVSS v2 Base Score: 5.0\n (AV:N/AC:L/Au:N/C:N/I:N/A:P): Denial of service bugs\n while parsing PDFs.\n\n - CVE-2010-4261: CVSS v2 Base Score: 5.0\n (AV:N/AC:L/Au:N/C:N/I:N/A:P): Memory corruption due to\n an off-by-one error within the icon_cb() function.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=none\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=656548\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2010-12/msg00024.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected clamav packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:clamav\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:clamav-db\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/05/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.1\", reference:\"clamav-0.96.5-0.1.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"clamav-db-0.96.5-0.1.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"clamav\");\n}\n", "naslFamily": "SuSE Local Security Checks", "pluginID": "53653", "cpe": ["cpe:/o:novell:opensuse:11.1", "p-cpe:/a:novell:opensuse:clamav", "p-cpe:/a:novell:opensuse:clamav-db"], "scheme": null}
{"cve": [{"lastseen": "2021-02-02T05:45:04", "description": "Off-by-one error in the icon_cb function in pe_icons.c in libclamav in ClamAV before 0.96.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information.", "edition": 7, "cvss3": {}, "published": "2010-12-07T13:53:00", "title": "CVE-2010-4261", "type": "cve", "cwe": ["CWE-189"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4261"], "modified": "2011-03-24T02:54:00", "cpe": ["cpe:/a:clamav:clamav:0.90.1", "cpe:/a:clamav:clamav:0.87", "cpe:/a:clamav:clamav:0.02", "cpe:/a:clamav:clamav:0.84", "cpe:/a:clamav:clamav:0.88.5", "cpe:/a:clamav:clamav:0.75.1", "cpe:/a:clamav:clamav:0.88.7_p1", "cpe:/a:clamav:clamav:0.88.6", "cpe:/a:clamav:clamav:0.92_p0", "cpe:/a:clamav:clamav:0.93.1", "cpe:/a:clamav:clamav:0.91.2", "cpe:/a:clamav:clamav:0.51", "cpe:/a:clamav:clamav:0.90", "cpe:/a:clamav:clamav:0.85", "cpe:/a:clamav:clamav:0.91.2_p0", "cpe:/a:clamav:clamav:0.90.3_p0", "cpe:/a:clamav:clamav:0.90.3", "cpe:/a:clamav:clamav:0.93.3", "cpe:/a:clamav:clamav:0.95", "cpe:/a:clamav:clamav:0.8", "cpe:/a:clamav:clamav:0.88.7", "cpe:/a:clamav:clamav:0.95.3", "cpe:/a:clamav:clamav:0.60", "cpe:/a:clamav:clamav:0.88", "cpe:/a:clamav:clamav:0.75", "cpe:/a:clamav:clamav:0.60p", "cpe:/a:clamav:clamav:0.71", "cpe:/a:clamav:clamav:0.96.4", "cpe:/a:clamav:clamav:0.96.2", "cpe:/a:clamav:clamav:0.91", "cpe:/a:clamav:clamav:0.03", "cpe:/a:clamav:clamav:0.93.2", "cpe:/a:clamav:clamav:0.65", "cpe:/a:clamav:clamav:0.91.1", "cpe:/a:clamav:clamav:0.86.2", "cpe:/a:clamav:clamav:0.66", "cpe:/a:clamav:clamav:0.10", "cpe:/a:clamav:clamav:0.92.1", "cpe:/a:clamav:clamav:0.01", "cpe:/a:clamav:clamav:0.94", "cpe:/a:clamav:clamav:0.87.1", "cpe:/a:clamav:clamav:0.24", "cpe:/a:clamav:clamav:0.74", "cpe:/a:clamav:clamav:0.05", "cpe:/a:clamav:clamav:0.20", "cpe:/a:clamav:clamav:0.88.2", "cpe:/a:clamav:clamav:0.88.1", "cpe:/a:clamav:clamav:0.68", "cpe:/a:clamav:clamav:0.22", "cpe:/a:clamav:clamav:0.21", "cpe:/a:clamav:clamav:0.96.3", "cpe:/a:clamav:clamav:0.90.1_p0", "cpe:/a:clamav:clamav:0.80", "cpe:/a:clamav:clamav:0.96.1", "cpe:/a:clamav:clamav:0.90.2_p0", "cpe:/a:clamav:clamav:0.80_rc", "cpe:/a:clamav:clamav:0.53", "cpe:/a:clamav:clamav:0.92", "cpe:/a:clamav:clamav:0.86.1", "cpe:/a:clamav:clamav:0.81", "cpe:/a:clamav:clamav:0.94.1", "cpe:/a:clamav:clamav:0.14", "cpe:/a:clamav:clamav:0.23", "cpe:/a:clamav:clamav:0.12", "cpe:/a:clamav:clamav:0.67-1", "cpe:/a:clamav:clamav:0.52", "cpe:/a:clamav:clamav:0.86", "cpe:/a:clamav:clamav:0.95.2", "cpe:/a:clamav:clamav:0.96", "cpe:/a:clamav:clamav:0.95.1", "cpe:/a:clamav:clamav:0.68.1", "cpe:/a:clamav:clamav:0.70", "cpe:/a:clamav:clamav:0.54", "cpe:/a:clamav:clamav:0.94.2", "cpe:/a:clamav:clamav:0.13", "cpe:/a:clamav:clamav:0.93", "cpe:/a:clamav:clamav:0.88.4", "cpe:/a:clamav:clamav:0.9", "cpe:/a:clamav:clamav:0.88.7_p0", "cpe:/a:clamav:clamav:0.82", "cpe:/a:clamav:clamav:0.90.3_p1", "cpe:/a:clamav:clamav:0.67", "cpe:/a:clamav:clamav:0.88.3", "cpe:/a:clamav:clamav:0.72", "cpe:/a:clamav:clamav:0.3", "cpe:/a:clamav:clamav:0.83", "cpe:/a:clamav:clamav:0.90.2", "cpe:/a:clamav:clamav:0.85.1", "cpe:/a:clamav:clamav:0.73", "cpe:/a:clamav:clamav:0.15"], "id": "CVE-2010-4261", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4261", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:clamav:clamav:0.52:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.94.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.96.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.70:rc:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.81:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.3_p1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.75.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90:rc3:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91.2_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.92.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.94.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.7:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.7_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.5:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.96.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95:src1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.67-1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.51:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.72:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.84:rc2:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.75:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.7_p1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.73:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80:rc4:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.3_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.92_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.6:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.70:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.2_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95:src2:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.86:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.96.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.14:pre:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.71:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.93.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.68:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.14:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.54:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90:rc1.1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.60p:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.53:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.1_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80:rc3:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.22:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.96:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.66:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.21:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.74:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80:rc:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.68.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90:rc2:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.96:rc2:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.24:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.67:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.65:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.93.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.4:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.60:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.93.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91:rc2:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95:rc2:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.23:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80:rc2:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.84:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.8:rc3:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80_rc:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:45:04", "description": "Multiple unspecified vulnerabilities in pdf.c in libclamav in ClamAV before 0.96.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document, aka (1) \"bb #2358\" and (2) \"bb #2396.\"", "edition": 8, "cvss3": {}, "published": "2010-12-07T13:53:00", "title": "CVE-2010-4260", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4260"], "modified": "2011-03-24T02:54:00", "cpe": ["cpe:/a:clamav:clamav:0.90.1", "cpe:/a:clamav:clamav:0.87", "cpe:/a:clamav:clamav:0.02", "cpe:/a:clamav:clamav:0.84", "cpe:/a:clamav:clamav:0.88.5", "cpe:/a:clamav:clamav:0.75.1", "cpe:/a:clamav:clamav:0.88.7_p1", "cpe:/a:clamav:clamav:0.88.6", "cpe:/a:clamav:clamav:0.92_p0", "cpe:/a:clamav:clamav:0.93.1", "cpe:/a:clamav:clamav:0.91.2", "cpe:/a:clamav:clamav:0.51", "cpe:/a:clamav:clamav:0.90", "cpe:/a:clamav:clamav:0.85", "cpe:/a:clamav:clamav:0.91.2_p0", "cpe:/a:clamav:clamav:0.90.3_p0", "cpe:/a:clamav:clamav:0.90.3", "cpe:/a:clamav:clamav:0.93.3", "cpe:/a:clamav:clamav:0.95", "cpe:/a:clamav:clamav:0.8", "cpe:/a:clamav:clamav:0.88.7", "cpe:/a:clamav:clamav:0.95.3", "cpe:/a:clamav:clamav:0.60", "cpe:/a:clamav:clamav:0.88", "cpe:/a:clamav:clamav:0.75", "cpe:/a:clamav:clamav:0.60p", "cpe:/a:clamav:clamav:0.71", "cpe:/a:clamav:clamav:0.96.4", "cpe:/a:clamav:clamav:0.96.2", "cpe:/a:clamav:clamav:0.91", "cpe:/a:clamav:clamav:0.03", "cpe:/a:clamav:clamav:0.93.2", "cpe:/a:clamav:clamav:0.65", "cpe:/a:clamav:clamav:0.91.1", "cpe:/a:clamav:clamav:0.86.2", "cpe:/a:clamav:clamav:0.66", "cpe:/a:clamav:clamav:0.10", "cpe:/a:clamav:clamav:0.92.1", "cpe:/a:clamav:clamav:0.01", "cpe:/a:clamav:clamav:0.94", "cpe:/a:clamav:clamav:0.87.1", "cpe:/a:clamav:clamav:0.24", "cpe:/a:clamav:clamav:0.74", "cpe:/a:clamav:clamav:0.05", "cpe:/a:clamav:clamav:0.20", "cpe:/a:clamav:clamav:0.88.2", "cpe:/a:clamav:clamav:0.88.1", "cpe:/a:clamav:clamav:0.68", "cpe:/a:clamav:clamav:0.22", "cpe:/a:clamav:clamav:0.21", "cpe:/a:clamav:clamav:0.96.3", "cpe:/a:clamav:clamav:0.90.1_p0", "cpe:/a:clamav:clamav:0.80", "cpe:/a:clamav:clamav:0.96.1", "cpe:/a:clamav:clamav:0.90.2_p0", "cpe:/a:clamav:clamav:0.80_rc", "cpe:/a:clamav:clamav:0.53", "cpe:/a:clamav:clamav:0.92", "cpe:/a:clamav:clamav:0.86.1", "cpe:/a:clamav:clamav:0.81", "cpe:/a:clamav:clamav:0.94.1", "cpe:/a:clamav:clamav:0.14", "cpe:/a:clamav:clamav:0.23", "cpe:/a:clamav:clamav:0.12", "cpe:/a:clamav:clamav:0.67-1", "cpe:/a:clamav:clamav:0.52", "cpe:/a:clamav:clamav:0.86", "cpe:/a:clamav:clamav:0.95.2", "cpe:/a:clamav:clamav:0.96", "cpe:/a:clamav:clamav:0.95.1", "cpe:/a:clamav:clamav:0.68.1", "cpe:/a:clamav:clamav:0.70", "cpe:/a:clamav:clamav:0.54", "cpe:/a:clamav:clamav:0.94.2", "cpe:/a:clamav:clamav:0.13", "cpe:/a:clamav:clamav:0.93", "cpe:/a:clamav:clamav:0.88.4", "cpe:/a:clamav:clamav:0.9", "cpe:/a:clamav:clamav:0.88.7_p0", "cpe:/a:clamav:clamav:0.82", "cpe:/a:clamav:clamav:0.90.3_p1", "cpe:/a:clamav:clamav:0.67", "cpe:/a:clamav:clamav:0.88.3", "cpe:/a:clamav:clamav:0.72", "cpe:/a:clamav:clamav:0.3", "cpe:/a:clamav:clamav:0.83", "cpe:/a:clamav:clamav:0.90.2", "cpe:/a:clamav:clamav:0.85.1", "cpe:/a:clamav:clamav:0.73", "cpe:/a:clamav:clamav:0.15"], "id": "CVE-2010-4260", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4260", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:clamav:clamav:0.52:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.94.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.96.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.70:rc:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.81:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.3_p1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.75.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90:rc3:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91.2_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.92.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.94.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.7:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.7_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.5:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.96.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95:src1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.67-1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.51:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.72:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.84:rc2:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.75:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.7_p1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.73:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80:rc4:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.3_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.92_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.6:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.70:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.2_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95:src2:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.86:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.96.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.14:pre:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.71:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.93.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.68:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.14:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.54:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90:rc1.1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.60p:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.53:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.1_p0:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80:rc3:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.22:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.96:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.66:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.21:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.74:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80:rc:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.68.1:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90:rc2:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.96:rc2:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.24:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.67:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.65:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.93.3:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.88.4:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.60:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.93.2:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91:rc2:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.95:rc2:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.23:*:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80:rc2:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.84:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.8:rc3:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.91:rc1:*:*:*:*:*:*", "cpe:2.3:a:clamav:clamav:0.80_rc:*:*:*:*:*:*:*"]}], "fedora": [{"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-4260", "CVE-2010-4261"], "description": "Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use with your own software. The virus database is based on the virus database from OpenAntiVirus, but contains additional signatures (including signatures for popular polymorphic viruses, too) and is KEPT UP TO DATE. ", "modified": "2010-12-07T20:08:56", "published": "2010-12-07T20:08:56", "id": "FEDORA:0BC23110B05", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 14 Update: clamav-0.96.5-1400.fc14", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-4260", "CVE-2010-4261", "CVE-2011-2721"], "description": "Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use with your own software. The virus database is based on the virus database from OpenAntiVirus, but contains additional signatures (including signatures for popular polymorphic viruses, too) and is KEPT UP TO DATE. ", "modified": "2011-08-17T01:19:38", "published": "2011-08-17T01:19:38", "id": "FEDORA:9A557110A85", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 14 Update: clamav-0.97.2-1400.fc14", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-0405", "CVE-2010-4260", "CVE-2010-4261", "CVE-2010-4479"], "description": "Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use with your own software. The virus database is based on the virus database from OpenAntiVirus, but contains additional signatures (including signatures for popular polymorphic viruses, too) and is KEPT UP TO DATE. ", "modified": "2010-12-19T20:22:09", "published": "2010-12-19T20:22:09", "id": "FEDORA:E7E4811074C", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 13 Update: clamav-0.96.5-1300.fc13", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-4260", "CVE-2010-4261", "CVE-2011-2721", "CVE-2011-3627"], "description": "Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use with your own software. The virus database is based on the virus database from OpenAntiVirus, but contains additional signatures (including signatures for popular polymorphic viruses, too) and is KEPT UP TO DATE. ", "modified": "2011-11-07T08:56:17", "published": "2011-11-07T08:56:17", "id": "FEDORA:9FB0E20B43", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 14 Update: clamav-0.97.3-1400.fc14", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-1639", "CVE-2010-4260", "CVE-2010-4261", "CVE-2011-1003"], "description": "Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use with your own software. The virus database is based on the virus database from OpenAntiVirus, but contains additional signatures (including signatures for popular polymorphic viruses, too) and is KEPT UP TO DATE. ", "modified": "2011-03-13T21:21:08", "published": "2011-03-13T21:21:08", "id": "FEDORA:9E58C10FE3D", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 14 Update: clamav-0.97-1400.fc14", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2010-0405", "CVE-2010-1639", "CVE-2010-4260", "CVE-2010-4261", "CVE-2011-1003"], "description": "Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use with your own software. The virus database is based on the virus database from OpenAntiVirus, but contains additional signatures (including signatures for popular polymorphic viruses, too) and is KEPT UP TO DATE. ", "modified": "2011-03-13T21:18:26", "published": "2011-03-13T21:18:26", "id": "FEDORA:B214B10F875", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 13 Update: clamav-0.97-1300.fc13", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2018-01-18T11:04:54", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-4260"], "description": "Check for the Version of clamav", "modified": "2018-01-17T00:00:00", "published": "2010-12-23T00:00:00", "id": "OPENVAS:1361412562310862708", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862708", "type": "openvas", "title": "Fedora Update for clamav FEDORA-2010-18568", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for clamav FEDORA-2010-18568\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"clamav on Fedora 14\";\ntag_insight = \"Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this\n software is the integration with mail servers (attachment scanning). The\n package provides a flexible and scalable multi-threaded daemon, a command\n line scanner, and a tool for automatic updating via Internet. The programs\n are based on a shared library distributed with the Clam AntiVirus package,\n which you can use with your own software. The virus database is based on\n the virus database from OpenAntiVirus, but contains additional signatures\n (including signatures for popular polymorphic viruses, too) and is KEPT UP\n TO DATE.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862708\");\n script_version(\"$Revision: 8447 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-17 17:12:19 +0100 (Wed, 17 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-18568\");\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\");\n script_name(\"Fedora Update for clamav FEDORA-2010-18568\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of clamav\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.96.5~1400.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-21T11:32:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-4260"], "description": "Check for the Version of clamav", "modified": "2017-12-20T00:00:00", "published": "2010-12-23T00:00:00", "id": "OPENVAS:862708", "href": "http://plugins.openvas.org/nasl.php?oid=862708", "type": "openvas", "title": "Fedora Update for clamav FEDORA-2010-18568", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for clamav FEDORA-2010-18568\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"clamav on Fedora 14\";\ntag_insight = \"Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this\n software is the integration with mail servers (attachment scanning). The\n package provides a flexible and scalable multi-threaded daemon, a command\n line scanner, and a tool for automatic updating via Internet. The programs\n are based on a shared library distributed with the Clam AntiVirus package,\n which you can use with your own software. The virus database is based on\n the virus database from OpenAntiVirus, but contains additional signatures\n (including signatures for popular polymorphic viruses, too) and is KEPT UP\n TO DATE.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html\");\n script_id(862708);\n script_version(\"$Revision: 8186 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-20 07:30:34 +0100 (Wed, 20 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-18568\");\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\");\n script_name(\"Fedora Update for clamav FEDORA-2010-18568\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of clamav\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.96.5~1400.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-04T11:18:04", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1031-1", "modified": "2017-12-01T00:00:00", "published": "2010-12-23T00:00:00", "id": "OPENVAS:840546", "href": "http://plugins.openvas.org/nasl.php?oid=840546", "type": "openvas", "title": "Ubuntu Update for clamav vulnerabilities USN-1031-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1031_1.nasl 7965 2017-12-01 07:38:25Z santu $\n#\n# Ubuntu Update for clamav vulnerabilities USN-1031-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Arkadiusz Miskiewicz and others discovered that the PDF processing\n code in libclamav improperly validated input. This could allow a\n remote attacker to craft a PDF document that could crash clamav or\n possibly execute arbitrary code. (CVE-2010-4260, CVE-2010-4479)\n\n It was discovered that an off-by-one error in the icon_cb function\n in pe_icons.c in libclamav could allow an attacker to corrupt\n memory, causing clamav to crash or possibly execute arbitrary code.\n (CVE-2010-4261)\n \n In the default installation, attackers would be isolated by the\n clamav AppArmor profile.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1031-1\";\ntag_affected = \"clamav vulnerabilities on Ubuntu 10.04 LTS ,\n Ubuntu 10.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1031-1/\");\n script_id(840546);\n script_version(\"$Revision: 7965 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 08:38:25 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"USN\", value: \"1031-1\");\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\", \"CVE-2010-4479\");\n script_name(\"Ubuntu Update for clamav vulnerabilities USN-1031-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"clamav-daemon\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-dbg\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-freshclam\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav-dev\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav6\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-milter\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-base\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-docs\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-testfiles\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"clamav-daemon\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-dbg\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-freshclam\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav-dev\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav6\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-milter\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-base\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-docs\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-testfiles\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-2721", "CVE-2010-4261", "CVE-2010-4260"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-08-19T00:00:00", "id": "OPENVAS:1361412562310863427", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863427", "type": "openvas", "title": "Fedora Update for clamav FEDORA-2011-10053", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for clamav FEDORA-2011-10053\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063870.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863427\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-19 15:17:22 +0200 (Fri, 19 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2011-10053\");\n script_cve_id(\"CVE-2011-2721\", \"CVE-2010-4260\", \"CVE-2010-4261\");\n script_name(\"Fedora Update for clamav FEDORA-2011-10053\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'clamav'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC14\");\n script_tag(name:\"affected\", value:\"clamav on Fedora 14\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.97.2~1400.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-25T10:55:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-2721", "CVE-2010-4261", "CVE-2010-4260"], "description": "Check for the Version of clamav", "modified": "2017-07-10T00:00:00", "published": "2011-08-19T00:00:00", "id": "OPENVAS:863427", "href": "http://plugins.openvas.org/nasl.php?oid=863427", "type": "openvas", "title": "Fedora Update for clamav FEDORA-2011-10053", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for clamav FEDORA-2011-10053\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"clamav on Fedora 14\";\ntag_insight = \"Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this\n software is the integration with mail servers (attachment scanning). The\n package provides a flexible and scalable multi-threaded daemon, a command\n line scanner, and a tool for automatic updating via Internet. The programs\n are based on a shared library distributed with the Clam AntiVirus package,\n which you can use with your own software. The virus database is based on\n the virus database from OpenAntiVirus, but contains additional signatures\n (including signatures for popular polymorphic viruses, too) and is KEPT UP\n TO DATE.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063870.html\");\n script_id(863427);\n script_version(\"$Revision: 6626 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:30:10 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-19 15:17:22 +0200 (Fri, 19 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2011-10053\");\n script_cve_id(\"CVE-2011-2721\", \"CVE-2010-4260\", \"CVE-2010-4261\");\n script_name(\"Fedora Update for clamav FEDORA-2011-10053\");\n\n script_summary(\"Check for the Version of clamav\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.97.2~1400.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-19T15:05:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1031-1", "modified": "2018-01-18T00:00:00", "published": "2010-12-23T00:00:00", "id": "OPENVAS:1361412562310840546", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840546", "type": "openvas", "title": "Ubuntu Update for clamav vulnerabilities USN-1031-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1031_1.nasl 8457 2018-01-18 07:58:32Z teissa $\n#\n# Ubuntu Update for clamav vulnerabilities USN-1031-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Arkadiusz Miskiewicz and others discovered that the PDF processing\n code in libclamav improperly validated input. This could allow a\n remote attacker to craft a PDF document that could crash clamav or\n possibly execute arbitrary code. (CVE-2010-4260, CVE-2010-4479)\n\n It was discovered that an off-by-one error in the icon_cb function\n in pe_icons.c in libclamav could allow an attacker to corrupt\n memory, causing clamav to crash or possibly execute arbitrary code.\n (CVE-2010-4261)\n \n In the default installation, attackers would be isolated by the\n clamav AppArmor profile.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1031-1\";\ntag_affected = \"clamav vulnerabilities on Ubuntu 10.04 LTS ,\n Ubuntu 10.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1031-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840546\");\n script_version(\"$Revision: 8457 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-18 08:58:32 +0100 (Thu, 18 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"USN\", value: \"1031-1\");\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\", \"CVE-2010-4479\");\n script_name(\"Ubuntu Update for clamav vulnerabilities USN-1031-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"clamav-daemon\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-dbg\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-freshclam\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav-dev\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav6\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-milter\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-base\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-docs\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-testfiles\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"clamav-daemon\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-dbg\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-freshclam\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav-dev\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav6\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-milter\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-base\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-docs\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-testfiles\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-20T13:17:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "description": "Check for the Version of clamav", "modified": "2017-12-19T00:00:00", "published": "2010-12-23T00:00:00", "id": "OPENVAS:1361412562310831280", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831280", "type": "openvas", "title": "Mandriva Update for clamav MDVSA-2010:249 (clamav)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for clamav MDVSA-2010:249 (clamav)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities were discovered and corrected in clamav:\n\n Multiple unspecified vulnerabilities in pdf.c in libclamav in ClamAV\n before 0.96.5 allow remote attackers to cause a denial of service\n (application crash) or possibly execute arbitrary code via a crafted\n PDF document (CVE-2010-4260, (CVE-2010-4479).\n \n Off-by-one error in the icon_cb function in pe_icons.c in libclamav\n in ClamAV before 0.96.5 allows remote attackers to cause a denial of\n service (memory corruption and application crash) or possibly execute\n arbitrary code via unspecified vectors. NOTE: some of these details\n are obtained from third party information (CVE-2010-4261).\n \n Packages for 2009.0 are provided as of the Extended Maintenance\n Program. Please visit this link to learn more:\n http://store.mandriva.com/product_info.php?cPath=149&products_id=490\n \n The updated clamav packages have been upgraded to the 0.96.5 version\n that is not vulnerable to these issues.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"clamav on Mandriva Linux 2009.0,\n Mandriva Linux 2009.0/X86_64,\n Mandriva Enterprise Server 5,\n Mandriva Enterprise Server 5/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-12/msg00006.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831280\");\n script_version(\"$Revision: 8168 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-19 08:30:15 +0100 (Tue, 19 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:249\");\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4479\", \"CVE-2010-4261\");\n script_name(\"Mandriva Update for clamav MDVSA-2010:249 (clamav)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of clamav\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_mes5\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-db\", rpm:\"clamav-db~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-milter\", rpm:\"clamav-milter~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamd\", rpm:\"clamd~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav6\", rpm:\"libclamav6~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav-devel\", rpm:\"libclamav-devel~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav6\", rpm:\"lib64clamav6~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav-devel\", rpm:\"lib64clamav-devel~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2009.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-db\", rpm:\"clamav-db~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-milter\", rpm:\"clamav-milter~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamd\", rpm:\"clamd~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav6\", rpm:\"libclamav6~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav-devel\", rpm:\"libclamav-devel~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav6\", rpm:\"lib64clamav6~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav-devel\", rpm:\"lib64clamav-devel~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-12T11:10:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "description": "Check for the Version of clamav", "modified": "2017-12-08T00:00:00", "published": "2010-12-23T00:00:00", "id": "OPENVAS:831280", "href": "http://plugins.openvas.org/nasl.php?oid=831280", "type": "openvas", "title": "Mandriva Update for clamav MDVSA-2010:249 (clamav)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for clamav MDVSA-2010:249 (clamav)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities were discovered and corrected in clamav:\n\n Multiple unspecified vulnerabilities in pdf.c in libclamav in ClamAV\n before 0.96.5 allow remote attackers to cause a denial of service\n (application crash) or possibly execute arbitrary code via a crafted\n PDF document (CVE-2010-4260, (CVE-2010-4479).\n \n Off-by-one error in the icon_cb function in pe_icons.c in libclamav\n in ClamAV before 0.96.5 allows remote attackers to cause a denial of\n service (memory corruption and application crash) or possibly execute\n arbitrary code via unspecified vectors. NOTE: some of these details\n are obtained from third party information (CVE-2010-4261).\n \n Packages for 2009.0 are provided as of the Extended Maintenance\n Program. Please visit this link to learn more:\n http://store.mandriva.com/product_info.php?cPath=149&products_id=490\n \n The updated clamav packages have been upgraded to the 0.96.5 version\n that is not vulnerable to these issues.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"clamav on Mandriva Linux 2009.0,\n Mandriva Linux 2009.0/X86_64,\n Mandriva Enterprise Server 5,\n Mandriva Enterprise Server 5/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-12/msg00006.php\");\n script_id(831280);\n script_version(\"$Revision: 8037 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-08 07:32:03 +0100 (Fri, 08 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:249\");\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4479\", \"CVE-2010-4261\");\n script_name(\"Mandriva Update for clamav MDVSA-2010:249 (clamav)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of clamav\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_mes5\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-db\", rpm:\"clamav-db~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-milter\", rpm:\"clamav-milter~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamd\", rpm:\"clamd~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav6\", rpm:\"libclamav6~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav-devel\", rpm:\"libclamav-devel~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav6\", rpm:\"lib64clamav6~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav-devel\", rpm:\"lib64clamav-devel~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2009.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-db\", rpm:\"clamav-db~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-milter\", rpm:\"clamav-milter~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamd\", rpm:\"clamd~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav6\", rpm:\"libclamav6~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav-devel\", rpm:\"libclamav-devel~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav6\", rpm:\"lib64clamav6~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav-devel\", rpm:\"lib64clamav-devel~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:42", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2011-1003", "CVE-2010-1639", "CVE-2010-4260"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-03-15T00:00:00", "id": "OPENVAS:1361412562310862889", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862889", "type": "openvas", "title": "Fedora Update for clamav FEDORA-2011-2743", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for clamav FEDORA-2011-2743\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055777.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862889\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-03-15 14:58:18 +0100 (Tue, 15 Mar 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2011-2743\");\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\", \"CVE-2010-1639\", \"CVE-2011-1003\");\n script_name(\"Fedora Update for clamav FEDORA-2011-2743\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'clamav'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC14\");\n script_tag(name:\"affected\", value:\"clamav on Fedora 14\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.97~1400.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:39:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-3627", "CVE-2011-2721", "CVE-2010-4261", "CVE-2010-4260"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-11-11T00:00:00", "id": "OPENVAS:1361412562310863608", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863608", "type": "openvas", "title": "Fedora Update for clamav FEDORA-2011-15076", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for clamav FEDORA-2011-15076\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-November/068940.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863608\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-11-11 09:52:43 +0530 (Fri, 11 Nov 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2011-15076\");\n script_cve_id(\"CVE-2011-3627\", \"CVE-2011-2721\", \"CVE-2010-4260\", \"CVE-2010-4261\");\n script_name(\"Fedora Update for clamav FEDORA-2011-15076\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'clamav'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC14\");\n script_tag(name:\"affected\", value:\"clamav on Fedora 14\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.97.3~1400.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-17T14:43:24", "description": "This is an update of clamav to version 0.96.5 to fix :\n\n - Denial of service bugs while parsing PDFs.\n (CVE-2010-4260)\n\n - Memory corruption due to an off-by-one error within the\n icon_cb() function. (CVE-2010-4261)", "edition": 23, "published": "2010-12-12T00:00:00", "title": "SuSE 10 Security Update : clamav (ZYPP Patch Number 7274)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-4260"], "modified": "2010-12-12T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_CLAMAV-7274.NASL", "href": "https://www.tenable.com/plugins/nessus/51135", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51135);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\");\n\n script_name(english:\"SuSE 10 Security Update : clamav (ZYPP Patch Number 7274)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This is an update of clamav to version 0.96.5 to fix :\n\n - Denial of service bugs while parsing PDFs.\n (CVE-2010-4260)\n\n - Memory corruption due to an off-by-one error within the\n icon_cb() function. (CVE-2010-4261)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-4260.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-4261.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 7274.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/12/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:3, reference:\"clamav-0.96.5-0.4.2\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"clamav-0.96.5-0.4.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:10:00", "description": "This is an update of clamav to version 0.96.5 to fix :\n\n - Denial of service bugs while parsing PDFs.\n (CVE-2010-4260)\n\n - Memory corruption due to an off-by-one error within the\n icon_cb() function (CVE-2010-4261)", "edition": 23, "published": "2010-12-10T00:00:00", "title": "SuSE 11 / 11.1 Security Update : clamav (SAT Patch Numbers 3645 / 3646)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-4260"], "modified": "2010-12-10T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:11:clamav", "cpe:/o:novell:suse_linux:11"], "id": "SUSE_11_CLAMAV-101206.NASL", "href": "https://www.tenable.com/plugins/nessus/51112", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51112);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\");\n\n script_name(english:\"SuSE 11 / 11.1 Security Update : clamav (SAT Patch Numbers 3645 / 3646)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This is an update of clamav to version 0.96.5 to fix :\n\n - Denial of service bugs while parsing PDFs.\n (CVE-2010-4260)\n\n - Memory corruption due to an off-by-one error within the\n icon_cb() function (CVE-2010-4261)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=none\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=656548\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-4260.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-4261.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Apply SAT patch number 3645 / 3646 as appropriate.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:clamav\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/12/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"clamav-0.96.5-0.1.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"clamav-0.96.5-0.1.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"i586\", reference:\"clamav-0.96.5-0.1.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"clamav-0.96.5-0.1.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"clamav-0.96.5-0.1.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"clamav-0.96.5-0.1.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:02:39", "description": "This is an update of clamav to version 0.96.5 to fix :\n\n - Denial of service bugs while parsing PDFs.\n (CVE-2010-4260)\n\n - Memory corruption due to an off-by-one error within the\n icon_cb() function. (CVE-2010-4261)", "edition": 23, "published": "2010-12-10T00:00:00", "title": "SuSE9 Security Update : clamav (YOU Patch Number 12666)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-4260"], "modified": "2010-12-10T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE9_12666.NASL", "href": "https://www.tenable.com/plugins/nessus/51111", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51111);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\");\n\n script_name(english:\"SuSE9 Security Update : clamav (YOU Patch Number 12666)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 9 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This is an update of clamav to version 0.96.5 to fix :\n\n - Denial of service bugs while parsing PDFs.\n (CVE-2010-4260)\n\n - Memory corruption due to an off-by-one error within the\n icon_cb() function. (CVE-2010-4261)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-4260.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-4261.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply YOU patch number 12666.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/12/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 9 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SUSE9\", reference:\"clamav-0.96.5-0.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:07:09", "description": "Upgrade to version clamav 0.96.5 to fix :\n\n - CVE-2010-4260: CVSS v2 Base Score: 5.0\n (AV:N/AC:L/Au:N/C:N/I:N/A:P): Denial of service bugs\n while parsing PDFs.\n\n - CVE-2010-4261: CVSS v2 Base Score: 5.0\n (AV:N/AC:L/Au:N/C:N/I:N/A:P): Memory corruption due to\n an off-by-one error within the icon_cb() function.", "edition": 24, "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : clamav (openSUSE-SU-2010:1041-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-4260"], "modified": "2014-06-13T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:clamav", "p-cpe:/a:novell:opensuse:clamav-db", "cpe:/o:novell:opensuse:11.3"], "id": "SUSE_11_3_CLAMAV-101206.NASL", "href": "https://www.tenable.com/plugins/nessus/75449", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update clamav-3644.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(75449);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\");\n\n script_name(english:\"openSUSE Security Update : clamav (openSUSE-SU-2010:1041-1)\");\n script_summary(english:\"Check for the clamav-3644 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Upgrade to version clamav 0.96.5 to fix :\n\n - CVE-2010-4260: CVSS v2 Base Score: 5.0\n (AV:N/AC:L/Au:N/C:N/I:N/A:P): Denial of service bugs\n while parsing PDFs.\n\n - CVE-2010-4261: CVSS v2 Base Score: 5.0\n (AV:N/AC:L/Au:N/C:N/I:N/A:P): Memory corruption due to\n an off-by-one error within the icon_cb() function.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=none\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=656548\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2010-12/msg00024.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected clamav packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:clamav\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:clamav-db\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.3\", reference:\"clamav-0.96.5-0.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"clamav-db-0.96.5-0.2.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"clamav\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:05:39", "description": "Upgrade to version clamav 0.96.5 to fix :\n\n - CVE-2010-4260: CVSS v2 Base Score: 5.0\n (AV:N/AC:L/Au:N/C:N/I:N/A:P): Denial of service bugs\n while parsing PDFs.\n\n - CVE-2010-4261: CVSS v2 Base Score: 5.0\n (AV:N/AC:L/Au:N/C:N/I:N/A:P): Memory corruption due to\n an off-by-one error within the icon_cb() function.", "edition": 24, "published": "2011-05-05T00:00:00", "title": "openSUSE Security Update : clamav (openSUSE-SU-2010:1041-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-4260"], "modified": "2011-05-05T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:clamav", "cpe:/o:novell:opensuse:11.2", "p-cpe:/a:novell:opensuse:clamav-db"], "id": "SUSE_11_2_CLAMAV-101206.NASL", "href": "https://www.tenable.com/plugins/nessus/53701", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update clamav-3644.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(53701);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\");\n\n script_name(english:\"openSUSE Security Update : clamav (openSUSE-SU-2010:1041-1)\");\n script_summary(english:\"Check for the clamav-3644 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Upgrade to version clamav 0.96.5 to fix :\n\n - CVE-2010-4260: CVSS v2 Base Score: 5.0\n (AV:N/AC:L/Au:N/C:N/I:N/A:P): Denial of service bugs\n while parsing PDFs.\n\n - CVE-2010-4261: CVSS v2 Base Score: 5.0\n (AV:N/AC:L/Au:N/C:N/I:N/A:P): Memory corruption due to\n an off-by-one error within the icon_cb() function.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=none\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=656548\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2010-12/msg00024.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected clamav packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:clamav\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:clamav-db\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/05/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.2\", reference:\"clamav-0.96.5-0.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"clamav-db-0.96.5-0.2.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"clamav\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:08:26", "description": " - Sat Dec 4 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de> - 0.96.5-1400\n\n - updated to 0.96.5\n\n - CVE-2010-4260 Multiple errors within the processing of\n PDF files can be exploited to e.g. cause a crash.\n\n - CVE-2010-4261 An off-by-one error within the 'icon_cb()'\n function can be exploited to cause a memory corruption.\n\n - Sun Oct 31 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de> - 0.96.4-1400\n\n - updated to 0.96.4\n\n - execute 'make check' (#640347) but ignore errors for\n now because four checks are failing on f13\n\n - Tue Oct 5 2010 jkeating - 0.96.3-1400.1\n\n - Rebuilt for gcc bug 634757\n\n - Wed Sep 29 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de>\n\n - lowered stop priority of sysv initscripts (#629435)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 26, "published": "2010-12-08T00:00:00", "title": "Fedora 14 : clamav-0.96.5-1400.fc14 (2010-18568)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "modified": "2010-12-08T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:14", "p-cpe:/a:fedoraproject:fedora:clamav"], "id": "FEDORA_2010-18568.NASL", "href": "https://www.tenable.com/plugins/nessus/51068", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2010-18568.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51068);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\", \"CVE-2010-4479\");\n script_bugtraq_id(45152);\n script_xref(name:\"FEDORA\", value:\"2010-18568\");\n\n script_name(english:\"Fedora 14 : clamav-0.96.5-1400.fc14 (2010-18568)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Sat Dec 4 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de> - 0.96.5-1400\n\n - updated to 0.96.5\n\n - CVE-2010-4260 Multiple errors within the processing of\n PDF files can be exploited to e.g. cause a crash.\n\n - CVE-2010-4261 An off-by-one error within the 'icon_cb()'\n function can be exploited to cause a memory corruption.\n\n - Sun Oct 31 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de> - 0.96.4-1400\n\n - updated to 0.96.4\n\n - execute 'make check' (#640347) but ignore errors for\n now because four checks are failing on f13\n\n - Tue Oct 5 2010 jkeating - 0.96.3-1400.1\n\n - Rebuilt for gcc bug 634757\n\n - Wed Sep 29 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de>\n\n - lowered stop priority of sysv initscripts (#629435)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=659861\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?84c221b8\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected clamav package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:clamav\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:14\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/12/08\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^14([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 14.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC14\", reference:\"clamav-0.96.5-1400.fc14\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"clamav\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-03-01T01:41:23", "description": "According to its version, the clamd antivirus daemon on the remote\nhost is earlier than 0.96.5. Such versions are reportedly affected by\nmultiple vulnerabilities :\n\n - Multiple errors exist in the PDF processing functions in\n 'libclamav/pdf.c', which could lead to application\n crashes. (Bugs 2358, 2380, 2396)\n\n - An off-by-one error exists in the handling of icons such\n that a crafted icon may be used to cause an integer\n overflow. (Bug 2344)", "edition": 27, "published": "2010-12-10T00:00:00", "title": "ClamAV < 0.96.5 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:clamav:clamav"], "id": "CLAMAV_0_96_5.NASL", "href": "https://www.tenable.com/plugins/nessus/51125", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(51125);\n script_version(\"1.14\");\n script_cvs_date(\"Date: 2018/11/15 20:50:23\");\n\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\", \"CVE-2010-4479\");\n script_bugtraq_id(45152);\n script_xref(name:\"Secunia\", value:\"42426\");\n\n script_name(english:\"ClamAV < 0.96.5 Multiple Vulnerabilities\");\n script_summary(english:\"Checks response to a clamd VERSION command\");\n\n script_set_attribute(attribute:\"synopsis\", value:\"The remote antivirus service is affected by multiple vulnerabilities.\");\n\n script_set_attribute(attribute:\"description\", value:\n\"According to its version, the clamd antivirus daemon on the remote\nhost is earlier than 0.96.5. Such versions are reportedly affected by\nmultiple vulnerabilities :\n\n - Multiple errors exist in the PDF processing functions in\n 'libclamav/pdf.c', which could lead to application\n crashes. (Bugs 2358, 2380, 2396)\n\n - An off-by-one error exists in the handling of icons such\n that a crafted icon may be used to cause an integer\n overflow. (Bug 2344)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8aeafa37\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4caa8742\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?87149641\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?022c6883\");\n script_set_attribute(attribute:\"see_also\", value:\"http://freshmeat.net/projects/clamav/releases/325193\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to ClamAV 0.96.5 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/11/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/11/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/12/10\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:clamav:clamav\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"clamav_detect.nasl\");\n script_require_keys(\"Antivirus/ClamAV/version\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n# nb. banner checks of open source software are prone to false-\n# positives so only run the check if reporting is paranoid.\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nversion = get_kb_item_or_exit(\"Antivirus/ClamAV/version\");\nport = get_service(svc:\"clamd\", default:3310, exit_on_fail:TRUE);\n\n# Check the version number.\n#\n# nb: versions like 0.94rc1 are possible.\nver = split(version, sep:'.', keep:FALSE);\nfor (i=0; i<max_index(ver); i++)\n ver[i] = int(ver[i]);\n\nif (\n (\n ver[0] == 0 &&\n (\n ver[1] < 96 ||\n (ver[1] == 96 && ver[2] < 5)\n )\n )\n)\n{\n if (report_verbosity > 0)\n {\n fixed_version = \"0.96.5\";\n\n report =\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_version + '\\n';\n security_hole(port:port, extra:report);\n }\n else security_hole(port);\n exit(0);\n}\nelse exit(0, \"The host is not affected since ClamAV version \" + version + \" is installed.\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-03-01T07:19:53", "description": "Arkadiusz Miskiewicz and others discovered that the PDF processing\ncode in libclamav improperly validated input. This could allow a\nremote attacker to craft a PDF document that could crash clamav or\npossibly execute arbitrary code. (CVE-2010-4260, CVE-2010-4479)\n\nIt was discovered that an off-by-one error in the icon_cb function in\npe_icons.c in libclamav could allow an attacker to corrupt memory,\ncausing clamav to crash or possibly execute arbitrary code.\n(CVE-2010-4261)\n\nIn the default installation, attackers would be isolated by the clamav\nAppArmor profile.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 26, "published": "2010-12-10T00:00:00", "title": "Ubuntu 10.04 LTS / 10.10 : clamav vulnerabilities (USN-1031-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "modified": "2021-03-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:clamav-daemon", "p-cpe:/a:canonical:ubuntu_linux:libclamav6", "p-cpe:/a:canonical:ubuntu_linux:clamav-milter", "p-cpe:/a:canonical:ubuntu_linux:libclamav-dev", "p-cpe:/a:canonical:ubuntu_linux:clamav-dbg", "p-cpe:/a:canonical:ubuntu_linux:clamav-freshclam", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "cpe:/o:canonical:ubuntu_linux:10.10", "p-cpe:/a:canonical:ubuntu_linux:clamav-docs", "p-cpe:/a:canonical:ubuntu_linux:clamav-base", "p-cpe:/a:canonical:ubuntu_linux:clamav-testfiles", "p-cpe:/a:canonical:ubuntu_linux:clamav"], "id": "UBUNTU_USN-1031-1.NASL", "href": "https://www.tenable.com/plugins/nessus/51117", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1031-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(51117);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/09/19 12:54:26\");\n\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\", \"CVE-2010-4479\");\n script_bugtraq_id(45152);\n script_xref(name:\"USN\", value:\"1031-1\");\n\n script_name(english:\"Ubuntu 10.04 LTS / 10.10 : clamav vulnerabilities (USN-1031-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Arkadiusz Miskiewicz and others discovered that the PDF processing\ncode in libclamav improperly validated input. This could allow a\nremote attacker to craft a PDF document that could crash clamav or\npossibly execute arbitrary code. (CVE-2010-4260, CVE-2010-4479)\n\nIt was discovered that an off-by-one error in the icon_cb function in\npe_icons.c in libclamav could allow an attacker to corrupt memory,\ncausing clamav to crash or possibly execute arbitrary code.\n(CVE-2010-4261)\n\nIn the default installation, attackers would be isolated by the clamav\nAppArmor profile.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1031-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:clamav\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:clamav-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:clamav-daemon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:clamav-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:clamav-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:clamav-freshclam\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:clamav-milter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:clamav-testfiles\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libclamav-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libclamav6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/12/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/12/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2010-2019 Canonical, Inc. / NASL script (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(10\\.04|10\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 10.04 / 10.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"10.04\", pkgname:\"clamav\", pkgver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"clamav-base\", pkgver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"clamav-daemon\", pkgver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"clamav-dbg\", pkgver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"clamav-docs\", pkgver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"clamav-freshclam\", pkgver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"clamav-milter\", pkgver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"clamav-testfiles\", pkgver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libclamav-dev\", pkgver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libclamav6\", pkgver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"clamav\", pkgver:\"0.96.3+dfsg-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"clamav-base\", pkgver:\"0.96.3+dfsg-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"clamav-daemon\", pkgver:\"0.96.3+dfsg-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"clamav-dbg\", pkgver:\"0.96.3+dfsg-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"clamav-docs\", pkgver:\"0.96.3+dfsg-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"clamav-freshclam\", pkgver:\"0.96.3+dfsg-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"clamav-milter\", pkgver:\"0.96.3+dfsg-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"clamav-testfiles\", pkgver:\"0.96.3+dfsg-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libclamav-dev\", pkgver:\"0.96.3+dfsg-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libclamav6\", pkgver:\"0.96.3+dfsg-2ubuntu1.2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"clamav / clamav-base / clamav-daemon / clamav-dbg / clamav-docs / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T11:53:00", "description": "Multiple vulnerabilities were discovered and corrected in clamav :\n\nMultiple unspecified vulnerabilities in pdf.c in libclamav in ClamAV\nbefore 0.96.5 allow remote attackers to cause a denial of service\n(application crash) or possibly execute arbitrary code via a crafted\nPDF document (CVE-2010-4260, (CVE-2010-4479).\n\nOff-by-one error in the icon_cb function in pe_icons.c in libclamav in\nClamAV before 0.96.5 allows remote attackers to cause a denial of\nservice (memory corruption and application crash) or possibly execute\narbitrary code via unspecified vectors. NOTE: some of these details\nare obtained from third-party information (CVE-2010-4261).\n\nPackages for 2009.0 are provided as of the Extended Maintenance\nProgram. Please visit this link to learn more:\nhttp://store.mandriva.com/product_info.php?cPath=149&products_id=4\n90\n\nThe updated clamav packages have been upgraded to the 0.96.5 version\nthat is not vulnerable to these issues.", "edition": 24, "published": "2010-12-08T00:00:00", "title": "Mandriva Linux Security Advisory : clamav (MDVSA-2010:249)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "modified": "2010-12-08T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:clamd", "p-cpe:/a:mandriva:linux:clamav", "cpe:/o:mandriva:linux:2009.0", "p-cpe:/a:mandriva:linux:libclamav6", "p-cpe:/a:mandriva:linux:clamav-milter", "p-cpe:/a:mandriva:linux:clamav-db", "p-cpe:/a:mandriva:linux:lib64clamav6", "p-cpe:/a:mandriva:linux:lib64clamav-devel", "p-cpe:/a:mandriva:linux:libclamav-devel"], "id": "MANDRIVA_MDVSA-2010-249.NASL", "href": "https://www.tenable.com/plugins/nessus/51071", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2010:249. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51071);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\", \"CVE-2010-4479\");\n script_bugtraq_id(45152);\n script_xref(name:\"MDVSA\", value:\"2010:249\");\n\n script_name(english:\"Mandriva Linux Security Advisory : clamav (MDVSA-2010:249)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities were discovered and corrected in clamav :\n\nMultiple unspecified vulnerabilities in pdf.c in libclamav in ClamAV\nbefore 0.96.5 allow remote attackers to cause a denial of service\n(application crash) or possibly execute arbitrary code via a crafted\nPDF document (CVE-2010-4260, (CVE-2010-4479).\n\nOff-by-one error in the icon_cb function in pe_icons.c in libclamav in\nClamAV before 0.96.5 allows remote attackers to cause a denial of\nservice (memory corruption and application crash) or possibly execute\narbitrary code via unspecified vectors. NOTE: some of these details\nare obtained from third-party information (CVE-2010-4261).\n\nPackages for 2009.0 are provided as of the Extended Maintenance\nProgram. Please visit this link to learn more:\nhttp://store.mandriva.com/product_info.php?cPath=149&products_id=4\n90\n\nThe updated clamav packages have been upgraded to the 0.96.5 version\nthat is not vulnerable to these issues.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:clamav\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:clamav-db\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:clamav-milter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:clamd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64clamav-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64clamav6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libclamav-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libclamav6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2009.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/12/08\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2009.0\", reference:\"clamav-0.96.5-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"clamav-db-0.96.5-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"clamav-milter-0.96.5-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"clamd-0.96.5-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64clamav-devel-0.96.5-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64clamav6-0.96.5-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libclamav-devel-0.96.5-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libclamav6-0.96.5-0.1mdv2009.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:08:26", "description": " - Sat Dec 4 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de> - 0.96.5-1300\n\n - updated to 0.96.5\n\n - CVE-2010-4260 Multiple errors within the processing of\n PDF files can be exploited to e.g. cause a crash.\n\n - CVE-2010-4261 An off-by-one error within the 'icon_cb()'\n function can be exploited to cause a memory corruption.\n\n - Sun Oct 31 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de> - 0.96.4-1300\n\n - updated to 0.96.4\n\n - execute 'make check' (#640347) but ignore errors for\n now because four checks are failing on f13\n\n - Wed Sep 29 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de>\n\n - lowered stop priority of sysv initscripts (#629435)\n\n - Wed Sep 22 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de> - 0.96.3-1300\n\n - updated to 0.96.3\n\n - fixes CVE-2010-0405 in shipped bzlib.c copy\n\n - Sun Aug 15 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de> - 0.96.2-1300\n\n - updated to 0.96.2\n\n - rediffed patches\n\n - removed the -jit-disable patch which is replaced\n upstream by a more detailed configuration option.\n\n - Wed Aug 11 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de>\n\n - use 'groupmems', not 'usermod' to add a user to a\n group because 'usermod' does not work when user does\n not exist in local /etc/passwd\n\n - Tue Jun 1 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de> - 0.96.1-1400\n\n - updated to 0.96.1\n\n - applied upstream patch which allows to disable JIT\n compiler (#573191)\n\n - disabled JIT compiler by default\n\n - removed explicit 'pkgconfig' requirements in -devel\n (#533956)\n\n - added some BRs\n\n - rediffed patches\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 26, "published": "2010-12-20T00:00:00", "title": "Fedora 13 : clamav-0.96.5-1300.fc13 (2010-18564)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-4261", "CVE-2010-0405", "CVE-2010-4479", "CVE-2010-4260"], "modified": "2010-12-20T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:13", "p-cpe:/a:fedoraproject:fedora:clamav"], "id": "FEDORA_2010-18564.NASL", "href": "https://www.tenable.com/plugins/nessus/51346", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2010-18564.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51346);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\", \"CVE-2010-4479\");\n script_bugtraq_id(45152);\n script_xref(name:\"FEDORA\", value:\"2010-18564\");\n\n script_name(english:\"Fedora 13 : clamav-0.96.5-1300.fc13 (2010-18564)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Sat Dec 4 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de> - 0.96.5-1300\n\n - updated to 0.96.5\n\n - CVE-2010-4260 Multiple errors within the processing of\n PDF files can be exploited to e.g. cause a crash.\n\n - CVE-2010-4261 An off-by-one error within the 'icon_cb()'\n function can be exploited to cause a memory corruption.\n\n - Sun Oct 31 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de> - 0.96.4-1300\n\n - updated to 0.96.4\n\n - execute 'make check' (#640347) but ignore errors for\n now because four checks are failing on f13\n\n - Wed Sep 29 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de>\n\n - lowered stop priority of sysv initscripts (#629435)\n\n - Wed Sep 22 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de> - 0.96.3-1300\n\n - updated to 0.96.3\n\n - fixes CVE-2010-0405 in shipped bzlib.c copy\n\n - Sun Aug 15 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de> - 0.96.2-1300\n\n - updated to 0.96.2\n\n - rediffed patches\n\n - removed the -jit-disable patch which is replaced\n upstream by a more detailed configuration option.\n\n - Wed Aug 11 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de>\n\n - use 'groupmems', not 'usermod' to add a user to a\n group because 'usermod' does not work when user does\n not exist in local /etc/passwd\n\n - Tue Jun 1 2010 Enrico Scholz <enrico.scholz at\n informatik.tu-chemnitz.de> - 0.96.1-1400\n\n - updated to 0.96.1\n\n - applied upstream patch which allows to disable JIT\n compiler (#573191)\n\n - disabled JIT compiler by default\n\n - removed explicit 'pkgconfig' requirements in -devel\n (#533956)\n\n - added some BRs\n\n - rediffed patches\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=659861\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?47e4fc18\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected clamav package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:clamav\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:13\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/12/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^13([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 13.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC13\", reference:\"clamav-0.96.5-1300.fc13\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"clamav\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2020-07-09T00:23:47", "bulletinFamily": "unix", "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "description": "Arkadiusz Miskiewicz and others discovered that the PDF processing \ncode in libclamav improperly validated input. This could allow a \nremote attacker to craft a PDF document that could crash clamav or \npossibly execute arbitrary code. (CVE-2010-4260, CVE-2010-4479)\n\nIt was discovered that an off-by-one error in the icon_cb function \nin pe_icons.c in libclamav could allow an attacker to corrupt \nmemory, causing clamav to crash or possibly execute arbitrary code. \n(CVE-2010-4261)\n\nIn the default installation, attackers would be isolated by the \nclamav AppArmor profile.", "edition": 5, "modified": "2010-12-10T00:00:00", "published": "2010-12-10T00:00:00", "id": "USN-1031-1", "href": "https://ubuntu.com/security/notices/USN-1031-1", "title": "ClamAV vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:38", "bulletinFamily": "software", "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "description": "===========================================================\r\nUbuntu Security Notice USN-1031-1 December 10, 2010\r\nclamav vulnerabilities\r\nCVE-2010-4260, CVE-2010-4261, CVE-2010-4479\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 10.04 LTS\r\nUbuntu 10.10\r\n\r\nThis advisory also applies to the corresponding versions of\r\nKubuntu, Edubuntu, and Xubuntu.\r\n\r\nThe problem can be corrected by upgrading your system to the\r\nfollowing package versions:\r\n\r\nUbuntu 10.04 LTS:\r\n libclamav6 0.96.3+dfsg-2ubuntu1.0.10.04.2\r\n\r\nUbuntu 10.10:\r\n libclamav6 0.96.3+dfsg-2ubuntu1.2\r\n\r\nIn general, a standard system update will make all the necessary changes.\r\n\r\nDetails follow:\r\n\r\nArkadiusz Miskiewicz and others discovered that the PDF processing\r\ncode in libclamav improperly validated input. This could allow a\r\nremote attacker to craft a PDF document that could crash clamav or\r\npossibly execute arbitrary code. (CVE-2010-4260, CVE-2010-4479)\r\n\r\nIt was discovered that an off-by-one error in the icon_cb function\r\nin pe_icons.c in libclamav could allow an attacker to corrupt\r\nmemory, causing clamav to crash or possibly execute arbitrary code.\r\n(CVE-2010-4261)\r\n\r\nIn the default installation, attackers would be isolated by the\r\nclamav AppArmor profile.\r\n\r\n\r\nUpdated packages for Ubuntu 10.04 LTS:\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.0.10.04.2.diff.gz\r\n Size/MD5: 284066 72a7c4ff80f395c5dc8e4e7acd6fcd39\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.0.10.04.2.dsc\r\n Size/MD5: 2323 d1d47147356bfaf610c993b8a9ed0530\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg.orig.tar.gz\r\n Size/MD5: 40572329 730c1af9badcee2bce4bbaf1cf8ea20a\r\n\r\n Architecture independent packages:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-base_0.96.3+dfsg-2ubuntu1.0.10.04.2_all.deb\r\n Size/MD5: 297088 745b7132479daa4dbdc5ca6cc023e0b2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-docs_0.96.3+dfsg-2ubuntu1.0.10.04.2_all.deb\r\n Size/MD5: 1295426 b03dae836f5cdf461c3a5f6a98a7363f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/c/clamav/clamav-testfiles_0.96.3+dfsg-2ubuntu1.0.10.04.2_all.deb\r\n Size/MD5: 5257088 aa5604ebd0f1e4646ce5d9e056513d11\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.0.10.04.2_amd64.deb\r\n Size/MD5: 424096 28c2f45042aafbf487e59ce679327bb3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.0.10.04.2_amd64.deb\r\n Size/MD5: 22343058 abe9dff9f24f9f9b6b9f9faf5be2936b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.0.10.04.2_amd64.deb\r\n Size/MD5: 313300 e88ecbee6c0f900b5854b2c1ca9b0771\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.0.10.04.2_amd64.deb\r\n Size/MD5: 335490 6d0081c84e0f46ee73bbf452309c03a3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.0.10.04.2_amd64.deb\r\n Size/MD5: 217914 11b54c1f926069a93149ce28b7cf5325\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.0.10.04.2_amd64.deb\r\n Size/MD5: 3898290 0bd7e669232378b4b83a8bfdd0c8d716\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.0.10.04.2_amd64.deb\r\n Size/MD5: 345108 843a766d2909777cc88ccbf03468a6fa\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.0.10.04.2_i386.deb\r\n Size/MD5: 410854 416f5d73612e5d37fbb904bb80dffb49\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.0.10.04.2_i386.deb\r\n Size/MD5: 22043342 aa53f5f25b3a28b22315e17544bd7a6d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.0.10.04.2_i386.deb\r\n Size/MD5: 308344 d090653db3483820420e465513b7d858\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.0.10.04.2_i386.deb\r\n Size/MD5: 327348 4cdcc06e3cfb9c241c7d6f560963116b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.0.10.04.2_i386.deb\r\n Size/MD5: 218084 752cc79037d5f08df096c528bc7eb8b6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.0.10.04.2_i386.deb\r\n Size/MD5: 3751526 c6dc2280d050c37f1f82ce62ba612cac\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.0.10.04.2_i386.deb\r\n Size/MD5: 338432 7156843fc6e5b7087d1fba58177ee81f\r\n\r\n armel architecture (ARM Architecture):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.0.10.04.2_armel.deb\r\n Size/MD5: 406882 b19ca9fc2963a4fe76940587ca7f8442\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.0.10.04.2_armel.deb\r\n Size/MD5: 1495938 235245876f8a1fd659ad3696e0b8cff0\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.0.10.04.2_armel.deb\r\n Size/MD5: 309068 4901391a555ca3b99facd67598e3ef63\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.0.10.04.2_armel.deb\r\n Size/MD5: 325884 8a8c68c7bef2a417c05140649aabb9e7\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.0.10.04.2_armel.deb\r\n Size/MD5: 217988 af08d9ccb28d785bd3067cee79f2d342\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.0.10.04.2_armel.deb\r\n Size/MD5: 692904 0a11d55c4b11b7c4b6fde5b7ae283f96\r\n \r\nhttp://ports.ubuntu.com/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.0.10.04.2_armel.deb\r\n Size/MD5: 338696 3956ef9d6b6a60777ac474f39594f5b7\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.0.10.04.2_powerpc.deb\r\n Size/MD5: 424978 52b56412f9313f830a49e6730f7bb4f1\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.0.10.04.2_powerpc.deb\r\n Size/MD5: 21946304 dadb3d6e3edd3d878c23043e0b3584d8\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.0.10.04.2_powerpc.deb\r\n Size/MD5: 312588 525bf79e6f80fa681de6e53a177fe4c8\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.0.10.04.2_powerpc.deb\r\n Size/MD5: 332978 b5e3e48ab070066931c15f0f9843b71c\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.0.10.04.2_powerpc.deb\r\n Size/MD5: 217914 7dd955a186cb8879aa479dd624b9f83a\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.0.10.04.2_powerpc.deb\r\n Size/MD5: 3694500 19f57c2f9c3330de8403f95ed26bd89a\r\n \r\nhttp://ports.ubuntu.com/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.0.10.04.2_powerpc.deb\r\n Size/MD5: 346032 4dcf3621752746f0683e88cfae681f98\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.0.10.04.2_sparc.deb\r\n Size/MD5: 417504 47562db771ffce66d1e33b023815529b\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.0.10.04.2_sparc.deb\r\n Size/MD5: 1521812 7e2834b60264a9944b54182dd66d2644\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.0.10.04.2_sparc.deb\r\n Size/MD5: 310268 09362fd78f8dd8aa40bf8d638f7e953c\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.0.10.04.2_sparc.deb\r\n Size/MD5: 330544 243c260c46b4786b22a831feca6c22a6\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.0.10.04.2_sparc.deb\r\n Size/MD5: 217912 140f98988be6715168cf7f5422ab6f76\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.0.10.04.2_sparc.deb\r\n Size/MD5: 772802 dd43c6b2029227a726eb3f5ab90e944a\r\n \r\nhttp://ports.ubuntu.com/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.0.10.04.2_sparc.deb\r\n Size/MD5: 343194 6e4b332cb4162cd29895a4b5171d2abd\r\n\r\nUpdated packages for Ubuntu 10.10:\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.2.diff.gz\r\n Size/MD5: 291139 9ce8ad8427f113d6e329a3c3812d68c0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.2.dsc\r\n Size/MD5: 2291 337c8ca91f8956bb01144d4bf3f13609\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg.orig.tar.gz\r\n Size/MD5: 40572329 730c1af9badcee2bce4bbaf1cf8ea20a\r\n\r\n Architecture independent packages:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-base_0.96.3+dfsg-2ubuntu1.2_all.deb\r\n Size/MD5: 299354 0702fd8ea1c31955e8fc797ae87c46b2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-docs_0.96.3+dfsg-2ubuntu1.2_all.deb\r\n Size/MD5: 1288682 882a0315fe510542baab00e77d557a78\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/c/clamav/clamav-testfiles_0.96.3+dfsg-2ubuntu1.2_all.deb\r\n Size/MD5: 5257128 6e78e746dcee221c2e95bc4dfa05f362\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.2_amd64.deb\r\n Size/MD5: 423112 f64bda3984cd1f8b760f5da57d3bca92\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.2_amd64.deb\r\n Size/MD5: 22417984 963e7c2edb60496ca072725e539e5b41\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.2_amd64.deb\r\n Size/MD5: 311226 0a361a85a35b6650d00fbe84c5a7580a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.2_amd64.deb\r\n Size/MD5: 334098 32f9b98511150530ad007a7c93c40386\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.2_amd64.deb\r\n Size/MD5: 217926 e1c3ab677049300717250e3908666cd1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.2_amd64.deb\r\n Size/MD5: 3922972 35138e4e10a58348be364e5b19ea5df9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.2_amd64.deb\r\n Size/MD5: 342886 de12b75256683c846f2919c696c71887\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.2_i386.deb\r\n Size/MD5: 410320 a7060679083c339a102a767ed2a3d9f7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.2_i386.deb\r\n Size/MD5: 21960252 d96e86f0a3d8cddd55cfc3bea3ef3daf\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.2_i386.deb\r\n Size/MD5: 310040 a482134aedc49b9a7eff0186fb6035cd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.2_i386.deb\r\n Size/MD5: 327554 f969082370c05ca79fcaf44062adebee\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.2_i386.deb\r\n Size/MD5: 217872 8f719985193939a25b03473bfbbcb952\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.2_i386.deb\r\n Size/MD5: 3725056 58b1925563125ea7eddb29731d27374a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.2_i386.deb\r\n Size/MD5: 340596 10c0a5c04be3d339c5301df687cb7487\r\n\r\n armel architecture (ARM Architecture):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.2_armel.deb\r\n Size/MD5: 416402 e22a834a33f2d363598865896256c192\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.2_armel.deb\r\n Size/MD5: 1530710 01fd1a616c74c7612913b3cc8a875395\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.2_armel.deb\r\n Size/MD5: 308092 4a743b08c9a1c8ad4ec79a6455334486\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.2_armel.deb\r\n Size/MD5: 328372 0ca2551f95b67a8af4c285e36b1efc50\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.2_armel.deb\r\n Size/MD5: 217954 db4b7c26334bc6f9a48af201f3c8ce53\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.2_armel.deb\r\n Size/MD5: 762684 87f79650eea51f5bca7953b4108f44c7\r\n \r\nhttp://ports.ubuntu.com/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.2_armel.deb\r\n Size/MD5: 341370 f941f44011e8220f1a1369e575ca8511\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.2_powerpc.deb\r\n Size/MD5: 423734 a3cba413ddba7c8c869ef1052695d72f\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.2_powerpc.deb\r\n Size/MD5: 21943056 c945d37dfdc2f90cfdd3afa9e13770ff\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.2_powerpc.deb\r\n Size/MD5: 312116 f75d13c70a666b6c50c94f11d8fc5fc7\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.2_powerpc.deb\r\n Size/MD5: 332152 9875d25fd10e30aa1caa97274fc6490c\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.2_powerpc.deb\r\n Size/MD5: 217878 dd01a33de40da567649a02f9bee20135\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.2_powerpc.deb\r\n Size/MD5: 3689510 ff8cd6d3eb28b66036db5ada5629cd7e\r\n \r\nhttp://ports.ubuntu.com/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.2_powerpc.deb\r\n Size/MD5: 345698 af4e9a8d36665dce94083e6c499ffdb3\r\n\r\n", "edition": 1, "modified": "2010-12-12T00:00:00", "published": "2010-12-12T00:00:00", "id": "SECURITYVULNS:DOC:25276", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25276", "title": "[USN-1031-1] ClamAV vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:39", "bulletinFamily": "software", "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "description": "Memory corruption on PDF and PE parsing.", "edition": 1, "modified": "2010-12-12T00:00:00", "published": "2010-12-12T00:00:00", "id": "SECURITYVULNS:VULN:11288", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11288", "title": "ClamAV antivirus multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:39", "bulletinFamily": "software", "cvelist": ["CVE-2011-0187", "CVE-2010-4008", "CVE-2011-0181", "CVE-2011-0174", "CVE-2011-0186", "CVE-2011-0182", "CVE-2011-0173", "CVE-2011-0188", "CVE-2011-0176", "CVE-2010-1324", "CVE-2010-4020", "CVE-2010-4261", "CVE-2010-3802", "CVE-2010-3089", "CVE-2011-0175", "CVE-2006-7243", "CVE-2010-3436", "CVE-2011-0189", "CVE-2010-4021", "CVE-2011-0180", "CVE-2010-3870", "CVE-2011-0184", "CVE-2011-0190", "CVE-2011-0179", "CVE-2011-0170", "CVE-2010-4009", "CVE-2010-3801", "CVE-2010-2068", "CVE-2011-0191", "CVE-2011-0178", "CVE-2010-0405", "CVE-2011-1417", "CVE-2011-0194", "CVE-2010-3315", "CVE-2010-1452", "CVE-2010-4479", "CVE-2010-3709", "CVE-2011-0172", "CVE-2011-0193", "CVE-2010-4494", "CVE-2011-0177", "CVE-2010-3710", "CVE-2010-3855", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-3814", "CVE-2010-4409", "CVE-2010-4260", "CVE-2010-1323", "CVE-2010-3434", "CVE-2010-3069", "CVE-2011-0192", "CVE-2011-0183"], "description": "About the security content of Mac OS X v10.6.7 and Security Update 2011-001\r\n\r\n Last Modified: March 21, 2011\r\n Article: HT4581\r\n\r\nEmail this article\r\nPrint this page\r\nSummary\r\n\r\nThis document describes the security content of Mac OS X v10.6.7 and Security Update 2011-001, which can be downloaded and installed via Software Update preferences, or from Apple Downloads.\r\n\r\nFor the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.\r\n\r\nFor information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."\r\n\r\nWhere possible, CVE IDs are used to reference the vulnerabilities for further information.\r\n\r\nTo learn about other Security Updates, see "Apple Security Updates."\r\nProducts Affected\r\n\r\nMac OS X 10.6, Product Security\r\nMac OS X v10.6.7 and Security Update 2011-001\r\n\r\n AirPort\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: When connected to Wi-Fi, an attacker on the same network may be able to cause a system reset\r\n\r\n Description: A divide by zero issue existed in the handling of Wi-Fi frames. When connected to Wi-Fi, an attacker on the same network may be able to cause a system reset. This issue does not affect systems prior to Mac OS X v10.6.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0172\r\n\r\n Apache\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Multiple vulnerabilities in Apache 2.2.15\r\n\r\n Description: Apache is updated to version 2.2.17 to address several vulnerabilities, the most serious of which may lead to a denial of service. Further information is available via the Apache web site at http://httpd.apache.org/\r\n\r\n CVE-ID\r\n\r\n CVE-2010-1452\r\n\r\n CVE-2010-2068\r\n\r\n AppleScript\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Running an AppleScript Studio-based application that allows untrusted input to be passed to a dialog may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A format string issue existed in AppleScript Studio's generic dialog commands ("display dialog" and "display alert"). Running an AppleScript Studio-based application that allows untrusted input to be passed to a dialog may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0173 : Alexander Strange\r\n\r\n ATS\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution\r\n\r\n Description: A heap buffer overflow issue existed in the handling of OpenType fonts. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0174\r\n\r\n ATS\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution\r\n\r\n Description: Multiple buffer overflow issues existed in the handling of TrueType fonts. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0175 : Christoph Diehl of Mozilla, Felix Grobert of the Google Security Team, Marc Schoenefeld of Red Hat Security Response Team, Tavis Ormandy and Will Drewry of Google Security Team\r\n\r\n ATS\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution\r\n\r\n Description: Multiple buffer overflow issues existed in the handling of Type 1 fonts. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0176 : Felix Grobert of the Google Security Team, geekable working with TippingPoint's Zero Day Initiative\r\n\r\n ATS\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution\r\n\r\n Description: Multiple buffer overflow issues existed in the handling of SFNT tables. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0177 : Marc Schoenefeld of Red Hat Security Response Team\r\n\r\n bzip2\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Using the command line bzip2 or bunzip2 tool to decompress a bzip2 file may result in an unexpected application termination or arbitrary code execution\r\n\r\n Description: An integer overflow issue existed in bzip2's handling of bzip2 compressed files. Using the command line bzip2 or bunzip2 tool to decompress a bzip2 file may result in an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-0405\r\n\r\n CarbonCore\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Applications that use FSFindFolder() with the kTemporaryFolderType flag may be vulnerable to a local information disclosure\r\n\r\n Description: When used with the kTemporaryFolderType flag, the FSFindFolder() API returns a directory that is world readable. This issue is addressed by returning a directory that is only readable by the user that the process is running as.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0178\r\n\r\n ClamAV\r\n\r\n Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6.6\r\n\r\n Impact: Multiple vulnerabilities in ClamAV\r\n\r\n Description: Multiple vulnerabilities exist in ClamAV, the most serious of which may lead to arbitrary code execution. This update addresses the issues by updating ClamAV to version 0.96.5. ClamAV is distributed only with Mac OS X Server systems. Further information is available via the ClamAV website at http://www.clamav.net/\r\n\r\n CVE-ID\r\n\r\n CVE-2010-0405\r\n\r\n CVE-2010-3434\r\n\r\n CVE-2010-4260\r\n\r\n CVE-2010-4261\r\n\r\n CVE-2010-4479\r\n\r\n CoreText\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution\r\n\r\n Description: A memory corruption issue existed in CoreText's handling of font files. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0179 : Christoph Diehl of Mozilla\r\n\r\n File Quarantine\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Definition added\r\n\r\n Description: The OSX.OpinionSpy definition has been added to the malware check within File Quarantine.\r\n\r\n HFS\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: A local user may be able to read arbitrary files from an HFS, HFS+, or HFS+J filesystem\r\n\r\n Description: An integer overflow issue existed in the handling of the F_READBOOTSTRAP ioctl. A local user may be able to read arbitrary files from an HFS, HFS+, or HFS+J filesystem.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0180 : Dan Rosenberg of Virtual Security Research\r\n\r\n ImageIO\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A heap buffer overflow issue existed in ImageIO's handling of JPEG images. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n \r\n\r\n CVE-ID\r\n\r\n CVE-2011-0170 : Andrzej Dyjak working with iDefense VCP\r\n\r\n ImageIO\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted XBM image may result in an unexpected application termination or arbitrary code execution\r\n\r\n Description: An integer overflow issue existed in ImageIO's handling of XBM images. Viewing a maliciously crafted XBM image may result in an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0181 : Harry Sintonen\r\n\r\n ImageIO\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution\r\n\r\n Description: A buffer overflow existed in libTIFF's handling of JPEG encoded TIFF images. Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0191 : Apple\r\n\r\n ImageIO\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution\r\n\r\n Description: A buffer overflow existed in libTIFF's handling of CCITT Group 4 encoded TIFF images. Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0192 : Apple\r\n\r\n ImageIO\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted JPEG-encoded TIFF image may result in an unexpected application termination or arbitrary code execution\r\n\r\n Description: An integer overflow issue existed in ImageIO's handling of JPEG-encoded TIFF images. Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution. This issue does not affect systems prior to Mac OS X v10.6.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0194 : Dominic Chell of NGS Secure\r\n\r\n Image RAW\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted Canon RAW image may result in an unexpected application termination or arbitrary code execution\r\n\r\n Description: Multiple buffer overflow issues existed in Image RAW's handling of Canon RAW images. Viewing a maliciously crafted Canon RAW image may result in an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0193 : Paul Harrington of NGS Secure\r\n\r\n Installer\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Visiting a maliciously crafted website may lead to the installation of an agent that contacts an arbitrary server when the user logs in, and mislead the user into thinking that the connection is with Apple\r\n\r\n Description: A URL processing issue in Install Helper may lead to the installation of an agent that contacts an arbitrary server when the user logs in. The dialog resulting from a connection failure may lead the user to believe that the connection was attempted with Apple. This issue is addressed by removing Install Helper.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0190 : Aaron Sigel of vtty.com\r\n\r\n Kerberos\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Multiple vulnerabilities in MIT Kerberos 5\r\n\r\n Description: Multiple cryptographic issues existed in MIT Kerberos 5. Only CVE-2010-1323 affects Mac OS X v10.5. Further information on the issues and the patches applied is available via the MIT Kerberos website at http://web.mit.edu/Kerberos/\r\n\r\n CVE-ID\r\n\r\n CVE-2010-1323\r\n\r\n CVE-2010-1324\r\n\r\n CVE-2010-4020\r\n\r\n CVE-2010-4021\r\n\r\n Kernel\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: A local user may be able to execute arbitrary code with system privileges\r\n\r\n Description: A privilege checking issue existed in the i386_set_ldt system call's handling of call gates. A local user may be able to execute arbitrary code with system privileges. This issue is addressed by disallowing creation of call gate entries via i386_set_ldt().\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0182 : Jeff Mears\r\n\r\n Libinfo\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: A remote attacker may be able to cause a denial of service on hosts that export NFS file systems\r\n\r\n Description: An integer truncation issue existed in Libinfo's handling of NFS RPC packets. A remote attacker may be able to cause NFS RPC services such as lockd, statd, mountd, and portmap to become unresponsive.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0183 : Peter Schwenk of the University of Delaware\r\n\r\n libxml\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A memory corruption issue existed in libxml's XPath handling. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-4008 : Bui Quang Minh from Bkis (www.bkis.com)\r\n\r\n libxml\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A double free issue existed in libxml's handling of XPath expressions. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue does not affect systems prior to Mac OS X v10.6.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-4494 : Yang Dingning of NCNIPC, Graduate University of Chinese Academy of Sciences\r\n\r\n Mailman\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Multiple vulnerabilities in Mailman 2.1.13\r\n\r\n Description: Multiple cross-site scripting issues existed in Mailman 2.1.13. These issues are addressed by updating Mailman to version 2.1.14. Further information is available via the Mailman site at http://mail.python.org/pipermail/mailman-announce/2010-September/000154.html\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3089\r\n\r\n PHP\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Multiple vulnerabilities in PHP 5.3.3\r\n\r\n Description: PHP is updated to version 5.3.4 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the PHP website at http://www.php.net/\r\n\r\n CVE-ID\r\n\r\n CVE-2006-7243\r\n\r\n CVE-2010-2950\r\n\r\n CVE-2010-3709\r\n\r\n CVE-2010-3710\r\n\r\n CVE-2010-3870\r\n\r\n CVE-2010-4150\r\n\r\n CVE-2010-4409\r\n\r\n PHP\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8\r\n\r\n Impact: Multiple vulnerabilities in PHP 5.2.14\r\n\r\n Description: PHP is updated to version 5.2.15 to address multiple vulnerabilities, the most serious of which may lead to arbitary code execution. Further information is available via the PHP website at http://www.php.net/\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3436\r\n\r\n CVE-2010-3709\r\n\r\n CVE-2010-4150\r\n\r\n QuickLook\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Downloading a maliciously crafted Excel file may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A memory corruption issue existed in QuickLook's handling of Excel files. Downloading a maliciously crafted Excel file may lead to an unexpected application termination or arbitrary code execution. This issue does not affect systems prior to Mac OS X v10.6.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0184 : Tobias Klein working with Verisign iDefense Labs\r\n\r\n QuickLook\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Downloading a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A memory corruption issue existed in QuickLook's handling of Microsoft Office files. Downloading a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-1417 : Charlie Miller and Dion Blazakis, working with TippingPoint's Zero Day Initiative\r\n\r\n QuickTime\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted JPEG2000 image with QuickTime may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: Multiple memory corruption issues existed in QuickTime's handling of JPEG2000 images. Viewing a maliciously crafted JPEG2000 image with QuickTime may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0186 : Will Dormann of the CERT/CC\r\n\r\n QuickTime\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: An integer overflow existed in QuickTime's handling of movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. For Mac OS X v10.5 this issue was addressed in QuickTime 7.6.9.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-4009 : Honggang Ren of Fortinet's FortiGuard Labs\r\n\r\n QuickTime\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A memory corruption issue existed in QuickTime's handling of FlashPix images. Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution. For Mac OS X v10.5 this issue was addressed in QuickTime 7.6.9.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3801 : Damian Put working with TippingPoint's Zero Day Initiative, and Rodrigo Rubira Branco from the Check Point Vulnerability Discovery Team\r\n\r\n QuickTime\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Visiting a maliciously crafted website may lead to the disclosure of video data from another site\r\n\r\n Description: A cross-origin issue existed in QuickTime plug-in's handling of cross-site redirects. Visiting a maliciously crafted website may lead to the disclosure of video data from another site. This issue is addressed by preventing QuickTime from following cross-site redirects.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0187 : Nirankush Panchbhai and Microsoft Vulnerability Research (MSVR)\r\n\r\n QuickTime\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A memory corruption issue existed in QuickTime's handling of panorama atoms in QTVR (QuickTime Virtual Reality) movie files. Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution. For Mac OS X v10.5 this issue was addressed in QuickTime 7.6.9.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3802 : an anonymous researcher working with TippingPoint's Zero Day Initiative\r\n\r\n Ruby\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Running a Ruby script that uses untrusted input to create a BigDecimal object may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: An integer truncation issue existed in Ruby's BigDecimal class. Running a Ruby script that uses untrusted input to create a BigDecimal object may lead to an unexpected application termination or arbitrary code execution. This issue only affects 64-bit Ruby processes.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0188 : Apple\r\n\r\n Samba\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: If SMB file sharing is enabled, a remote attacker may cause a denial of service or arbitrary code execution\r\n\r\n Description: A stack buffer overflow existed in Samba's handling of Windows Security IDs. If SMB file sharing is enabled, a remote attacker may cause a denial of service or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3069\r\n\r\n Subversion\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Subversion servers that use the non-default "SVNPathAuthz short_circuit" mod_dav_svn configuration setting may allow unauthorized users to access portions of the repository\r\n\r\n Description: Subversion servers that use the non-default "SVNPathAuthz short_circuit" mod_dav_svn configuration setting may allow unauthorized users to access portions of the repository. This issue is addressed by updating Subversion to version 1.6.13. This issue does not affect systems prior to Mac OS X v10.6.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3315\r\n\r\n Terminal\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: When ssh is used in Terminal's "New Remote Connection" dialog, SSH version 1 is selected as the default protocol version\r\n\r\n Description: When ssh is used in Terminal's "New Remote Connection" dialog, SSH version 1 is selected as the default protocol version. This issue is addressed by changing the default protocol version to "Automatic". This issue does not affect systems prior to Mac OS X v10.6.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0189 : Matt Warren of HNW Inc.\r\n\r\n X11\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Multiple vulnerabilities in FreeType\r\n\r\n Description: Multiple vulnerabilities existed in FreeType, the most serious of which may lead to arbitrary code execution when processing a maliciously crafted font. These issues are addressed by updating FreeType to version 2.4.3. Further information is available via the FreeType site at http://www.freetype.org/\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3814\r\n\r\n CVE-2010-3855\r\n", "edition": 1, "modified": "2011-03-23T00:00:00", "published": "2011-03-23T00:00:00", "id": "SECURITYVULNS:DOC:25963", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25963", "title": "About the security content of Mac OS X v10.6.7 and Security Update 2011-001", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:41", "bulletinFamily": "software", "cvelist": ["CVE-2011-0187", "CVE-2010-4008", "CVE-2011-0181", "CVE-2011-0174", "CVE-2011-0186", "CVE-2011-0182", "CVE-2011-0173", "CVE-2011-0188", "CVE-2011-0176", "CVE-2010-1324", "CVE-2010-4020", "CVE-2010-4261", "CVE-2010-3802", "CVE-2010-3089", "CVE-2011-0175", "CVE-2006-7243", "CVE-2010-3436", "CVE-2011-0189", "CVE-2010-4021", "CVE-2011-0180", "CVE-2010-3870", "CVE-2011-0184", "CVE-2011-0190", "CVE-2011-0179", "CVE-2011-0170", "CVE-2010-4009", "CVE-2010-3801", "CVE-2010-2068", "CVE-2011-0191", "CVE-2011-0178", "CVE-2010-0405", "CVE-2011-1417", "CVE-2011-0194", "CVE-2010-3315", "CVE-2010-1452", "CVE-2010-4479", "CVE-2010-3709", "CVE-2011-0172", "CVE-2011-0193", "CVE-2011-0200", "CVE-2010-4494", "CVE-2011-0177", "CVE-2010-3710", "CVE-2010-3855", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-3814", "CVE-2010-4409", "CVE-2010-4260", "CVE-2010-1323", "CVE-2010-3434", "CVE-2010-3069", "CVE-2011-0192", "CVE-2011-0183"], "description": "Multiple DoS conditions, format strings vulnerability in AppleScript, memory corruption on different file formats parsing, information leakage, privilege escalation.", "edition": 1, "modified": "2011-03-23T00:00:00", "published": "2011-03-23T00:00:00", "id": "SECURITYVULNS:VULN:11518", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11518", "title": "Apple Mac OS X multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:40", "bulletinFamily": "unix", "cvelist": ["CVE-2011-3627", "CVE-2011-2721", "CVE-2010-4261", "CVE-2011-1003", "CVE-2010-0405", "CVE-2010-4479", "CVE-2010-4260", "CVE-2010-3434"], "edition": 1, "description": "### Background\n\nClam AntiVirus (short: ClamAV) is an anti-virus toolkit for UNIX, designed especially for e-mail scanning on mail gateways. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Clam AntiVirus. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nAn unauthenticated remote attacker may execute arbitrary code with the privileges of the Clam AntiVirus process or cause a Denial of Service by causing an affected user or system to scan a crafted file. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Clam AntiVirus users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-antivirus/clamav-0.97.3\"", "modified": "2011-10-24T00:00:00", "published": "2011-10-24T00:00:00", "id": "GLSA-201110-20", "href": "https://security.gentoo.org/glsa/201110-20", "type": "gentoo", "title": "Clam AntiVirus: Multiple vulnerabilities", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}