Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.56617
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDKSA-2006:067 (clamav)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to clamav
announced via advisory MDKSA-2006:067.

Damian Put discovered an integer overflow in the PE header parser in
ClamAV that could be exploited if the ArchiveMaxFileSize option was
disabled (CVE-2006-1614).

Format strings in the logging code could possibly lead to the execution
of arbitrary code (CVE-2006-1615).

David Luyer found that ClamAV could be tricked into an invalid memory
access in the cli_bitset_set() function, which could lead to a Denial
of Service (CVE-2006-1630).

This update provides ClamAV 0.88.1 which corrects this issue and also
fixes some other bugs.

Affected: 10.2, 2006.0, Corporate 3.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2006:067

Risk factor : Critical

CVSS Score:
10.0

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-1614
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
BugTraq ID: 17388
http://www.securityfocus.com/bid/17388
BugTraq ID: 17951
http://www.securityfocus.com/bid/17951
Bugtraq: 20060406 [Overflow.pl] Clam AntiVirus Win32-UPX Heap Overflow (not default configuration) (Google Search)
http://www.securityfocus.com/archive/1/430405/100/0/threaded
Cert/CC Advisory: TA06-132A
http://www.us-cert.gov/cas/techalerts/TA06-132A.html
Debian Security Information: DSA-1024 (Google Search)
http://www.debian.org/security/2006/dsa-1024
http://www.gentoo.org/security/en/glsa/glsa-200604-06.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:067
http://www.overflow.pl/adv/clamavupxinteger.txt
http://www.osvdb.org/24457
http://securitytracker.com/id?1015887
http://secunia.com/advisories/19534
http://secunia.com/advisories/19536
http://secunia.com/advisories/19564
http://secunia.com/advisories/19567
http://secunia.com/advisories/19570
http://secunia.com/advisories/19608
http://secunia.com/advisories/20077
http://secunia.com/advisories/23719
SuSE Security Announcement: SUSE-SA:2006:020 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Apr/0002.html
http://www.trustix.org/errata/2006/0020
http://www.vupen.com/english/advisories/2006/1258
http://www.vupen.com/english/advisories/2006/1779
XForce ISS Database: clamav-pe-overflow(25660)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25660
Common Vulnerability Exposure (CVE) ID: CVE-2006-1615
http://www.osvdb.org/24458
XForce ISS Database: clamav-output-format-string(25661)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25661
Common Vulnerability Exposure (CVE) ID: CVE-2006-1630
http://www.osvdb.org/24459
XForce ISS Database: clamav-others-dos(25662)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25662
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.