exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-110

Mandriva Linux Security Advisory 2010-110
Posted May 28, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-110 - The cli_pdf function in libclamav/pdf.c in ClamAV before 0.96.1 allows remote attackers to cause a denial of service (crash) via a malformed PDF file, related to an inconsistency in the calculated stream length and the real stream length. Off-by-one error in the parseicon function in libclamav/pe_icons.c in ClamAV 0.96 allows remote attackers to cause a denial of service (crash) via a crafted PE icon that triggers an out-of-bounds read, related to improper rounding during scaling. This update provides clamav 0.96.1 which is not vulnerable to these issues.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2010-1639, CVE-2010-1640
SHA-256 | 8265db2be8f314e34b496a700d50e5bbb34294ef05e4b5aa3d2947737ecefc69

Mandriva Linux Security Advisory 2010-110

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:110
https://www.mandriva.com/security/
_______________________________________________________________________

Package : clamav
Date : May 27, 2010
Affected: 2008.0, 2009.0, Corporate 4.0, Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities was discovered and fixed in clamav:

The cli_pdf function in libclamav/pdf.c in ClamAV before 0.96.1 allows
remote attackers to cause a denial of service (crash) via a malformed
PDF file, related to an inconsistency in the calculated stream length
and the real stream length (CVE-2010-1639).

Off-by-one error in the parseicon function in libclamav/pe_icons.c
in ClamAV 0.96 allows remote attackers to cause a denial of service
(crash) via a crafted PE icon that triggers an out-of-bounds read,
related to improper rounding during scaling (CVE-2010-1640).

Packages for 2008.0 and 2009.0 are provided as of the Extended
Maintenance Program. Please visit this link to learn more:
https://store.mandriva.com/product_info.php?cPath=149&products_id=490

This update provides clamav 0.96.1 which is not vulnerable to these
issues.
_______________________________________________________________________

References:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1640
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
befa2aace21d5723723bb3a93444fff6 2008.0/i586/clamav-0.96.1-0.1mdv2008.0.i586.rpm
91de0b1b1d3717b02c5ec78f40b60068 2008.0/i586/clamav-db-0.96.1-0.1mdv2008.0.i586.rpm
5e63fa6565cbfaa4cc4000f77524a181 2008.0/i586/clamav-milter-0.96.1-0.1mdv2008.0.i586.rpm
58e46d78bf423fbb1ef84d6073fe1040 2008.0/i586/clamd-0.96.1-0.1mdv2008.0.i586.rpm
f24eadf9d0a1b0a7c733568207743385 2008.0/i586/libclamav6-0.96.1-0.1mdv2008.0.i586.rpm
3fee97d038854d35d18aee05054b6c0d 2008.0/i586/libclamav-devel-0.96.1-0.1mdv2008.0.i586.rpm
ffbe6ca177a8b262e4c6fc0ca0f3669c 2008.0/SRPMS/clamav-0.96.1-0.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
1082117001d058707bdfacc642498a2a 2008.0/x86_64/clamav-0.96.1-0.1mdv2008.0.x86_64.rpm
21bd752b8b431e61c089ccf428d01d29 2008.0/x86_64/clamav-db-0.96.1-0.1mdv2008.0.x86_64.rpm
2f83a0bb14fcefb8717f80964b173894 2008.0/x86_64/clamav-milter-0.96.1-0.1mdv2008.0.x86_64.rpm
a873d1c7e555552e1c3d66b0515f83cb 2008.0/x86_64/clamd-0.96.1-0.1mdv2008.0.x86_64.rpm
7646d23e108a6e14f8d4092415ac02b9 2008.0/x86_64/lib64clamav6-0.96.1-0.1mdv2008.0.x86_64.rpm
658acc18cafe0edfa371ecbc014df8ae 2008.0/x86_64/lib64clamav-devel-0.96.1-0.1mdv2008.0.x86_64.rpm
ffbe6ca177a8b262e4c6fc0ca0f3669c 2008.0/SRPMS/clamav-0.96.1-0.1mdv2008.0.src.rpm

Mandriva Linux 2009.0:
a8d05f37aa91c68aae2085ff732c702b 2009.0/i586/clamav-0.96.1-0.1mdv2009.0.i586.rpm
5ec9f018d0041edb436550c89309171d 2009.0/i586/clamav-db-0.96.1-0.1mdv2009.0.i586.rpm
99628e6c2a48857b8826602c697b16ab 2009.0/i586/clamav-milter-0.96.1-0.1mdv2009.0.i586.rpm
0224610ee1b6329eff5c22d7f39578f0 2009.0/i586/clamd-0.96.1-0.1mdv2009.0.i586.rpm
fca0b7af4f6bb22071c75baab07a35b1 2009.0/i586/libclamav6-0.96.1-0.1mdv2009.0.i586.rpm
bdabf8cdc50a4c5685e6d260afe415b3 2009.0/i586/libclamav-devel-0.96.1-0.1mdv2009.0.i586.rpm
d11af730b3a2c053ba1d6ec23fc564f0 2009.0/SRPMS/clamav-0.96.1-0.1mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
60f63c024a8f817dadffa0d89e21eb9f 2009.0/x86_64/clamav-0.96.1-0.1mdv2009.0.x86_64.rpm
18f79b9b586bc80732dd10dbd2a6cc79 2009.0/x86_64/clamav-db-0.96.1-0.1mdv2009.0.x86_64.rpm
a581fe3f1c8361fabaf3cb9f376d59cb 2009.0/x86_64/clamav-milter-0.96.1-0.1mdv2009.0.x86_64.rpm
86a0d9f2a488e4da2fe6b53527b815e7 2009.0/x86_64/clamd-0.96.1-0.1mdv2009.0.x86_64.rpm
7e9bad2cfe4809f985d9d908af327b8d 2009.0/x86_64/lib64clamav6-0.96.1-0.1mdv2009.0.x86_64.rpm
d805cfe2b75d9a0fa2ffa0d31d7d27ec 2009.0/x86_64/lib64clamav-devel-0.96.1-0.1mdv2009.0.x86_64.rpm
d11af730b3a2c053ba1d6ec23fc564f0 2009.0/SRPMS/clamav-0.96.1-0.1mdv2009.0.src.rpm

Corporate 4.0:
1f908bfa4cbe1232569026efcf034b12 corporate/4.0/i586/clamav-0.96.1-0.1.20060mlcs4.i586.rpm
647ff93c4169583e606987983de6f938 corporate/4.0/i586/clamav-db-0.96.1-0.1.20060mlcs4.i586.rpm
a1bd815b64388a6a04fd14f423970c70 corporate/4.0/i586/clamav-milter-0.96.1-0.1.20060mlcs4.i586.rpm
fe0f9d33df3d9127161a8551dbb7e6c7 corporate/4.0/i586/clamd-0.96.1-0.1.20060mlcs4.i586.rpm
2faa8d0b9553999d5b18314ce63bf06b corporate/4.0/i586/libclamav6-0.96.1-0.1.20060mlcs4.i586.rpm
e4728f4fa514d353279521d8ae782c0a corporate/4.0/i586/libclamav-devel-0.96.1-0.1.20060mlcs4.i586.rpm
517ac78ca08fe3ccd80ccd0e160c4f02 corporate/4.0/SRPMS/clamav-0.96.1-0.1.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
6848c1a8b646e217c290e4a557cf6a7d corporate/4.0/x86_64/clamav-0.96.1-0.1.20060mlcs4.x86_64.rpm
205ce302337f02c1ce74539f65d95901 corporate/4.0/x86_64/clamav-db-0.96.1-0.1.20060mlcs4.x86_64.rpm
d788499888b228f17d34d707f99d399f corporate/4.0/x86_64/clamav-milter-0.96.1-0.1.20060mlcs4.x86_64.rpm
31f2d05f1fda805f2a95a68f0742e460 corporate/4.0/x86_64/clamd-0.96.1-0.1.20060mlcs4.x86_64.rpm
e553aec47a2d26e41662593697b10ed9 corporate/4.0/x86_64/lib64clamav6-0.96.1-0.1.20060mlcs4.x86_64.rpm
383fe32d703c2c99d7102dfa78061a06 corporate/4.0/x86_64/lib64clamav-devel-0.96.1-0.1.20060mlcs4.x86_64.rpm
517ac78ca08fe3ccd80ccd0e160c4f02 corporate/4.0/SRPMS/clamav-0.96.1-0.1.20060mlcs4.src.rpm

Mandriva Enterprise Server 5:
6239df4cb3848f6d0e623ca388537808 mes5/i586/clamav-0.96.1-0.1mdvmes5.1.i586.rpm
d5bdcebae3ce25c8314cd91729df1891 mes5/i586/clamav-db-0.96.1-0.1mdvmes5.1.i586.rpm
32f0750aed27bd140bf5da065f1e1ebe mes5/i586/clamav-milter-0.96.1-0.1mdvmes5.1.i586.rpm
dd545fdb4cf27d717d589beb3787ff11 mes5/i586/clamd-0.96.1-0.1mdvmes5.1.i586.rpm
8a191c540f7228a36a4301c0442e3a68 mes5/i586/libclamav6-0.96.1-0.1mdvmes5.1.i586.rpm
f3b1106a99b6161553cf83812231cae5 mes5/i586/libclamav-devel-0.96.1-0.1mdvmes5.1.i586.rpm
bc8e69f99a4837cb5c7127604addaa74 mes5/SRPMS/clamav-0.96.1-0.1mdvmes5.1.src.rpm

Mandriva Enterprise Server 5/X86_64:
0c4c0c12601d5539497cf25c429ce553 mes5/x86_64/clamav-0.96.1-0.1mdvmes5.1.x86_64.rpm
6ea9c8f7d8383e9e5623eb2fd7b56d03 mes5/x86_64/clamav-db-0.96.1-0.1mdvmes5.1.x86_64.rpm
ec4ef11b9a1cb4e89cd36d8aa8788071 mes5/x86_64/clamav-milter-0.96.1-0.1mdvmes5.1.x86_64.rpm
6a5e85303ae96eb1123aabf4a72c1014 mes5/x86_64/clamd-0.96.1-0.1mdvmes5.1.x86_64.rpm
8b070d1b989a43b0145614dff41881ae mes5/x86_64/lib64clamav6-0.96.1-0.1mdvmes5.1.x86_64.rpm
cbee60050896a187b449647fa7f4e330 mes5/x86_64/lib64clamav-devel-0.96.1-0.1mdvmes5.1.x86_64.rpm
bc8e69f99a4837cb5c7127604addaa74 mes5/SRPMS/clamav-0.96.1-0.1mdvmes5.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

https://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFL/nI8mqjQ0CJFipgRApflAJ0aWGQPfjtPbacIlezjVyoQqG1smgCfcqGT
yM1hw8RzpdyMgTUHfdx4UEI=
=KQZ3
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close