Secunia Security Advisory - SUSE has issued an update for clamav. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).
cdaea1df2081a4bb136af0b00df3f46fa9d778a7aa9c043ed43e885c99785ba9
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
Try it out online:
http://secunia.com/software_inspector/
----------------------------------------------------------------------
TITLE:
SUSE update for clamav
SECUNIA ADVISORY ID:
SA24183
VERIFY ADVISORY:
http://secunia.com/advisories/24183/
CRITICAL:
Moderately critical
IMPACT:
DoS
WHERE:
>From remote
OPERATING SYSTEM:
SUSE Linux 10.1
http://secunia.com/product/10796/
SUSE Linux 10
http://secunia.com/product/6221/
SUSE Linux 9.3
http://secunia.com/product/4933/
openSUSE 10.2
http://secunia.com/product/13375/
SUSE Linux Enterprise Server 9
http://secunia.com/product/4118/
SUSE Linux Enterprise Server 10
http://secunia.com/product/12192/
SOFTWARE:
Novell Open Enterprise Server
http://secunia.com/product/4664/
DESCRIPTION:
SUSE has issued an update for clamav. This fixes two vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
For more information:
SA24187
SOLUTION:
Apply updated packages.
-- x86 Platform --
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/clamav-0.90-0.1.i586.rpm
450fd88ce94fb7421d7232e55ca7be57
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/clamav-0.90-0.2.i586.rpm
9bb705eef58f149c6023fa25a2e7441d
SUSE LINUX 10.0:
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/clamav-0.90-0.1.i586.rpm
abe77980ac3d274549acef965d9b3ed5
SUSE LINUX 9.3:
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/clamav-0.90-0.1.i586.rpm
d0ab2a48d370941ee4037ffab8686916
-- Power PC Platform --
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/clamav-0.90-0.1.ppc.rpm
506b432229252c3188a977c46c847ef9
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/clamav-0.90-0.2.ppc.rpm
4de0855522f57a533bdb770e6c760abf
SUSE LINUX 10.0:
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/clamav-0.90-0.1.ppc.rpm
b0b11ecfb27387259b0589f943dc6bd2
-- x86-64 Platform --
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/clamav-0.90-0.1.x86_64.rpm
c6d88b70c377db486524e8331cc19ded
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/clamav-0.90-0.2.x86_64.rpm
9eb79478b0a8d83370fabcf43e47b5ae
SUSE LINUX 10.0:
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/clamav-0.90-0.1.x86_64.rpm
fbe3ec3733c4483c5b7dfd890d5a6079
SUSE LINUX 9.3:
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/clamav-0.90-0.1.x86_64.rpm
cd744ebc2447166b5cc7bd065a93c4b5
Sources:
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/clamav-0.90-0.1.src.rpm
ab8ddfd395ab7fccde2e152e13d4e5a1
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/clamav-0.90-0.2.src.rpm
1f43996fcef6f47298ea8fcc2ea07eaa
SUSE LINUX 10.0:
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/clamav-0.90-0.1.src.rpm
9d7f916f64ce377bec6a531d9fa74590
SUSE LINUX 9.3:
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/clamav-0.90-0.1.src.rpm
9887574f7864200081f230fa32e78db8
Open Enterprise Server
Novell Linux POS 9
SUSE SLES 10
SUSE SLES 9
http://support.novell.com/techcenter/psdb/abe28be29295a2d1e392e79ff39d4b40.html
ORIGINAL ADVISORY:
http://lists.suse.com/archive/suse-security-announce/2007-Feb/0004.html
OTHER REFERENCES:
SA24187:
http://secunia.com/advisories/24187/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------