The ZDI advisory already had a CAN in it, but there must be something weird with their format because I missed it at first, too, even though it was right at the top! :)
- Steve ====================================================== Name: CVE-2005-3303 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3303 Reference: MISC:http://www.zerodayinitiative.com/advisories/ZDI-05-002.html The FSG unpacker (fsg.c) in Clam AntiVirus (ClamAV) 0.80 through 0.87 allows remote attackers to cause "memory corruption" and execute arbitrary code via a crafted FSG 1.33 file. ====================================================== Name: CVE-2005-3500 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3500 Reference: IDEFENSE:20051104 Clam AntiVirus tnef_attachment() DoS Vulnerability Reference: URL:http://www.idefense.com/application/poi/display?id=333&type=vulnerabilities The tnef_attachment function in tnef.c for Clam AntiVirus (ClamAV) before 0.87.1 allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via a crafted value in a CAB file that causes ClamAV to repeatedly scan the same block. ====================================================== Name: CVE-2005-3501 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3501 Reference: IDEFENSE:20051104 Clam AntiVirus Cabinet-file handling Denial of Service Vulnerability Reference: URL:http://www.idefense.com/application/poi/display?id=334&type=vulnerabilities The cabd_find function in cabd.c of the the libmspack library (mspack) for Clam AntiVirus (ClamAV) before 0.87.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted CAB file that causes cabd_find to be called with a zero length. _______________________________________________ Secure-testing-team mailing list [email protected] http://lists.alioth.debian.org/mailman/listinfo/secure-testing-team

