Thanks Erik,
you always provide a great support!

Kindly Regards,
Alberto.

Erik A. Espinoza ha scritto:
New clamav is released on the main page.

Erik

On Sun, Nov 16, 2008 at 11:58 PM, David Sánchez Martín
<[EMAIL PROTECTED]> wrote:
Hi list,

 For our own common interest:

 http://www.securityfocus.com/bid/32207/discuss


 ClamAV is prone to an off-by-one heap-based buffer-overflow vulnerability
because the application fails to perform adequate boundary checks on
user-supplied data.

 Successfully exploiting this issue will allow attackers to execute
arbitrary code within the context of the affected application. Failed
exploit attempts will result in a denial-of-service condition.

 Versions prior to ClamAV 0.94.1 are vulnerable.

 Current clamav-toaster is 0.94, so, there's a chance we are affected by
this issue.

 May be it's time to let clamav package be updated via OS updates?


 Best regards,

---
David Sanchez Martin
Administrador de Sistemas
[EMAIL PROTECTED]
GPG Key ID: 0x37E7AC1F

E2000 Nuevas Tecnologías
Tel : +34 902 830500




---------------------------------------------------------------------
     QmailToaster hosted by: VR Hosted <http://www.vr.org>
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]





---------------------------------------------------------------------
    QmailToaster hosted by: VR Hosted <http://www.vr.org>
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to