what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 29891

Secunia Security Advisory 29891
Posted Apr 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, to cause a DoS (Denial of Service), or to compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, suse
SHA-256 | e5f7a63179f5929f125a0a212dbb34a8d28b6805336f67804f1f9cc17e584c9d

Secunia Security Advisory 29891

Change Mirror Download
----------------------------------------------------------------------

Secunia Network Software Inspector 2.0 (NSI) - Public Beta

4 days left of beta period.

The 1st generation of the Secunia Network Software Inspector (NSI)
has been available for corporate users for almost 1 year and its been
a tremendous success.

The 2nd generation Secunia NSI is built on the same technology as the
award winning Secunia PSI, which has already been downloaded and
installed on more than 400,000 computers world wide.

Learn more / Download (instant access):
http://secunia.com/network_software_inspector_2/

----------------------------------------------------------------------

TITLE:
SUSE update for clamav

SECUNIA ADVISORY ID:
SA29891

VERIFY ADVISORY:
http://secunia.com/advisories/29891/

CRITICAL:
Highly critical

IMPACT:
Security Bypass, DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
SUSE Linux 10.1
http://secunia.com/product/10796/
openSUSE 10.2
http://secunia.com/product/13375/
openSUSE 10.3
http://secunia.com/product/16124/
SUSE Linux Enterprise Server 9
http://secunia.com/product/4118/
SUSE Linux Enterprise Server 10
http://secunia.com/product/12192/

SOFTWARE:
Novell Open Enterprise Server 1.x
http://secunia.com/product/4664/

DESCRIPTION:
SUSE has issued an update for clamav. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions, to cause a DoS (Denial of Service), or
to compromise a vulnerable system.

For more information:
SA29000

SOLUTION:
Apply updated packages.

x86 Platform:

openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/klamav-0.41.1-32.3.i586.rpm
5f062d237d2e2b467c04249d7ab4eaff

openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/clamav-0.93-0.3.i586.rpm
5c1208a1568ce8406cffbad97c17d5cd
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/clamav-db-0.93-0.3.i586.rpm
cc3797fc934ca8a7d36e951aedfd1205
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/klamav-0.41.1-17.4.i586.rpm
2d4a630d9477ad647c5f043a2061eec9

SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/clamav-0.93-0.6.i586.rpm
bae48419bbd6d98158b43a27d2e4ae26
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/clamav-db-0.93-0.6.i586.rpm
24c9cee54b8921b2c3896218ebf653fc

openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/clamav-0.93-0.3.i586.rpm
cb1b5ad1c50971cd67a969641eb09b5b
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/clamav-db-0.93-0.3.i586.rpm
05c5ad3009b29ce730089376c4e94437

Power PC Platform:

openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/clamav-0.93-0.3.ppc.rpm
0e6fd8ae2c47f5cf35671cf268c472a7
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/clamav-db-0.93-0.3.ppc.rpm
67bcdf76348f56ecf7e6e7f44551e58f
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/klamav-0.41.1-32.3.ppc.rpm
9d0be2b87217d54485717178877d0e27

openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/clamav-0.93-0.3.ppc.rpm
feea77a7898ef22fee24db6990dfcd53
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/clamav-db-0.93-0.3.ppc.rpm
c557477dfa4437292b476064b9008ce5
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/klamav-0.41.1-17.4.ppc.rpm
465357407c32c4b3f2858923dcf1fa79

SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/clamav-0.93-0.6.ppc.rpm
aefcb66e85016ea7ffac9ec90f07b941
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/clamav-db-0.93-0.6.ppc.rpm
c41dab747d0917115afca974dbf71f56

x86-64 Platform:

openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/clamav-0.93-0.3.x86_64.rpm
b52b015df19d50ed90d59aaef2359695
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/clamav-db-0.93-0.3.x86_64.rpm
60450bcf1b6e77d9c401f39e53c80b80
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/klamav-0.41.1-32.3.x86_64.rpm
6889d3a67a917066a36a8f29dea43b60

openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/clamav-0.93-0.3.x86_64.rpm
6ad977899b59f5dc29c3499b57794fe2
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/clamav-db-0.93-0.3.x86_64.rpm
b69ab97fc38e5156fd14997621070521
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/klamav-0.41.1-17.4.x86_64.rpm
dfa9b572d5e7756ee3f7c9f515430fcb

SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/clamav-0.93-0.6.x86_64.rpm
d823bff9b6bd7a8363577d452cf32f85
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/clamav-db-0.93-0.6.x86_64.rpm
9fa30054ab60358dd34227fc1ba534c4

Sources:

SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/clamav-0.93-0.6.src.rpm
46330515b9c6195b80df21260727c917

openSUSE 10.3:
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/clamav-0.93-0.3.src.rpm
b69d60de1059e37b16f1b8f4b6fdbcb0
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/klamav-0.41.1-32.3.src.rpm
e6dc89b046f7cb3649b480d0979d67c4

openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/clamav-0.93-0.3.src.rpm
4dfc2359d565c5584eed51fb0b6477cd
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/klamav-0.41.1-17.4.src.rpm
69b4f005d5e1910f817c9a6a2d9fc227

ORIGINAL ADVISORY:
http://www.novell.com/linux/security/advisories/2008_24_clamav.html

OTHER REFERENCES:
SA29000:
http://secunia.com/advisories/29000/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close