Package: clamav
Version: 0.86.1-1
Severity: important

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

iDefense discovered several vulnerabilities in ClamAV (< 0.86) allowing
attackers to cause a Denial of Service condition.

http://www.idefense.com/application/poi/display?id=275&type=vulnerabilities
http://www.idefense.com/application/poi/display?id=276&type=vulnerabilities

Regards, Daniel


- -- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (850, 'unstable'), (700, 'testing'), (500, 'oldstable'), (500, 
'stable'), (110, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.8.15050330
Locale: LANG=de_DE, LC_CTYPE=de_DE (charmap=ISO-8859-1)

Versions of packages clamav depends on:
ii  clamav-freshclam [clamav-da 0.86.1-1     downloads clamav virus databases f
ii  libbz2-1.0                  1.0.2-7      high-quality block-sorting file co
ii  libc6                       2.3.2.ds1-22 GNU C Library: Shared libraries an
ii  libclamav1                  0.86.1-1     virus scanner library
ii  libcurl3                    7.14.0-2     Multi-protocol file transfer libra
ii  libgmp3                     4.1.4-6      Multiprecision arithmetic library
ii  libidn11                    0.5.13-1.0   GNU libidn library, implementation
ii  libssl0.9.7                 0.9.7g-1     SSL shared libraries
ii  zlib1g                      1:1.2.2-4    compression library - runtime

Versions of packages clamav recommends:
ii  arj                           3.10.21-4  archiver for .arj files
ii  unzoo                         4.4-4      zoo archive extractor

- -- no debconf information

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFCxD7Kdg0kG0+YFBERAgvLAJ9HoAIVHTqA93al4/dDYe94ST81jwCePfJp
cygQhFBsjxWUpGd1O1Fzoak=
=PpCZ
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to