Hi list,

  For our own common interest:

  http://www.securityfocus.com/bid/32207/discuss

    
  ClamAV is prone to an off-by-one heap-based buffer-overflow vulnerability
because the application fails to perform adequate boundary checks on
user-supplied data.

  Successfully exploiting this issue will allow attackers to execute
arbitrary code within the context of the affected application. Failed
exploit attempts will result in a denial-of-service condition.

 Versions prior to ClamAV 0.94.1 are vulnerable. 
  
 Current clamav-toaster is 0.94, so, there's a chance we are affected by
this issue.

 May be it's time to let clamav package be updated via OS updates?


 Best regards,

---
David Sanchez Martin
Administrador de Sistemas
[EMAIL PROTECTED]
GPG Key ID: 0x37E7AC1F

E2000 Nuevas Tecnologías
Tel : +34 902 830500


Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to