Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2007.0340 -- [Debian] New clamav packages fix denial of service vulnerability 24 May 2007 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: clamav Publisher: Debian Operating System: Debian GNU/Linux 4.0 Impact: Denial of Service Access: Remote/Unauthenticated CVE Names: CVE-2007-2029 Ref: ESB-2007.0266 Original Bulletin: http://www.debian.org/security/2007/dsa-1281 Comment: This bulletin references a fix for a PDF handling issue in ClamAV from april. The previous patch was not successful in fixing the issue and new patches are now available. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------ Debian Security Advisory DSA-1281-2 security@debian.org http://www.debian.org/security/ Noah Meyerhans May 21, 2007 - - ------------------------------------------------------------------------ Package : clamav Vulnerability : file descriptor leak Problem type : remote Debian-specific: no CVE Id(s) : CVE-2007-2029 BugTraq ID : 23656 On 25 April, the Debian Security Team released clamav 0.90.1-3etch1, an update to the Clam anti-virus toolkit, to address several vulnerabilities. Unfortunately, there was an error in the updated packages and CVE-2007-2029, a file descriptor leak in the PDF document handler, was not properly fixed in Debian 4.0 (etch) or the Debian testing distribution (lenny). This problem has been fixed in version 0.90.1-3etch2 for Debian 4.0 (etch). The problem will be fixed in testing (lenny) in version clamav_0.90.1-3.1lenny2, to be released via the testing-security channel, as soon as possible. Other versions of Debian are not affected. We recommend that you upgrade your clamav packages. Upgrade instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian (stable) - - --------------- Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1.orig.tar.gz Size/MD5 checksum: 11643310 cd11c05b5476262eaea4fa3bd7dc25bf http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2.diff.gz Size/MD5 checksum: 202678 b69d5dd04efa34a1b5d754d00d02325a http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2.dsc Size/MD5 checksum: 886 8ea6dec6430464f80367174cbf1522ee Architecture independent packages: http://security.debian.org/pool/updates/main/c/clamav/clamav-base_0.90.1-3etch2_all.deb Size/MD5 checksum: 200024 399e614261bcf6fc11f9d8cb1f31aa36 http://security.debian.org/pool/updates/main/c/clamav/clamav-docs_0.90.1-3etch2_all.deb Size/MD5 checksum: 1005888 07cf61246264a02b5f3f75b712dc352f http://security.debian.org/pool/updates/main/c/clamav/clamav-testfiles_0.90.1-3etch2_all.deb Size/MD5 checksum: 157450 84cfbe25cbb8f43f84d3e7608dd1ff00 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_alpha.deb Size/MD5 checksum: 405598 e89e635ca763a960a2b9641034cffe1f http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_alpha.deb Size/MD5 checksum: 863126 be2975967f9abcad74ac30ad1a7b4ecc http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_alpha.deb Size/MD5 checksum: 509806 596fb241736d8336811f5631ef922937 http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_alpha.deb Size/MD5 checksum: 184282 678347363c2723c9562aa7e5edda23fe http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_alpha.deb Size/MD5 checksum: 643780 d44e46beb7ed21b5f423cc40d93feae9 http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_alpha.deb Size/MD5 checksum: 9303354 954ef0ff1af4fbafdf32d0230edf6d79 http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_alpha.deb Size/MD5 checksum: 179444 d066c1c6f9d1b738abba4150ecfbe3ef amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_amd64.deb Size/MD5 checksum: 176536 3b19c1bfabe694d90a047232a3cb21ea http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_amd64.deb Size/MD5 checksum: 178048 1d2d279449991d196c0444502fd05e7a http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_amd64.deb Size/MD5 checksum: 637530 8914446075225de9dc8c97dd16b83acd http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_amd64.deb Size/MD5 checksum: 856120 96322f73a53bc97b115ee7fcbfb3560e http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_amd64.deb Size/MD5 checksum: 366656 ff2956673dbbb4a62e5ab9153a80a9cf http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_amd64.deb Size/MD5 checksum: 385832 56bd5d5f8a4b2a1241c109d88d3b4279 http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_amd64.deb Size/MD5 checksum: 9301488 175ff062a9408489ec8c185124e209a4 arm architecture (ARM) http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_arm.deb Size/MD5 checksum: 362196 50bfa1d26925ac85140583fce13b3909 http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_arm.deb Size/MD5 checksum: 173260 8e65843c91e2a1fe5446cb540445556a http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_arm.deb Size/MD5 checksum: 9299326 4a9c05ea0f08fbca693f1884f116b0f8 http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_arm.deb Size/MD5 checksum: 366018 d07ef427cb65e5839f0b523c08d55c1c http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_arm.deb Size/MD5 checksum: 174362 74669807f901a4b8a3ce125b3ad333c9 http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_arm.deb Size/MD5 checksum: 596846 c1ac53e1501d73611556ffc547496f3b http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_arm.deb Size/MD5 checksum: 851644 952a117428093c42dd281b5c695832e0 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_hppa.deb Size/MD5 checksum: 176618 89bf2c97a2690eecccebe60e3a7cd55f http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_hppa.deb Size/MD5 checksum: 404346 22abe6d6d95e7933d38969fabc552253 http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_hppa.deb Size/MD5 checksum: 9302836 78c95396f0971eef4c1b8f73809b74a6 http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_hppa.deb Size/MD5 checksum: 617610 b0b2c5131ae5c8ebbbc049a0a204ffd4 http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_hppa.deb Size/MD5 checksum: 856878 b085a2d8317bce6476d6129df8962e38 http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_hppa.deb Size/MD5 checksum: 177774 0a2a82b14cdcf0cabd566e8ed8c74e9c http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_hppa.deb Size/MD5 checksum: 432198 c4ad61a24a60b73528db102363af6d00 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_i386.deb Size/MD5 checksum: 367872 4a4c2d68de04892779fa2ee18d454af1 http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_i386.deb Size/MD5 checksum: 9299034 a57a8dabcbfdb1ca948c7807e2b161d5 http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_i386.deb Size/MD5 checksum: 173352 1effd13aca20fd86e8b00d1a0a21e842 http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_i386.deb Size/MD5 checksum: 365298 a188cff902e8d3642e376a2185f48209 http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_i386.deb Size/MD5 checksum: 604376 3f2b2b9b7019c4b0ec612acab2de915b http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_i386.deb Size/MD5 checksum: 174936 ac2c9892b4ba30ecae20c35597b8fcc9 http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_i386.deb Size/MD5 checksum: 854652 8a44c143be20d81e88ac3500ef387df6 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_ia64.deb Size/MD5 checksum: 9314878 52935be009b4a84223a81151df5ddbba http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_ia64.deb Size/MD5 checksum: 474192 c31fc49ca7bdd22488a15b99357b5d76 http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_ia64.deb Size/MD5 checksum: 201282 f1fe669400c25fab7b39c54ef4eaecda http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_ia64.deb Size/MD5 checksum: 878096 fcdac4ab11700a235d4d39ebdbeb27c5 http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_ia64.deb Size/MD5 checksum: 190928 62d04383c37b80857a93467913a1c14c http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_ia64.deb Size/MD5 checksum: 656284 de83f9db8dfdf447752093747bd2a2d9 http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_ia64.deb Size/MD5 checksum: 520668 edc7f091eb3cc1186839384bfef06d21 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_mips.deb Size/MD5 checksum: 371698 fc79ffd010ad11bfa3160cf6ea3ce707 http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_mips.deb Size/MD5 checksum: 179500 911eb19759eaf1cf427542dae6f28406 http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_mips.deb Size/MD5 checksum: 174912 cf528b98d0097a8eb48f20904c9d2293 http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_mips.deb Size/MD5 checksum: 9301294 c790bf6ecaf6006c91e1cef8a4a77923 http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_mips.deb Size/MD5 checksum: 646430 f5c54dcdcded52b66ff4147fddc71f59 http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_mips.deb Size/MD5 checksum: 854314 305e3bf521ff3f2cd96792922a2c625b http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_mips.deb Size/MD5 checksum: 434900 6a543233716cd4b768afebbea6b61d6a mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_mipsel.deb Size/MD5 checksum: 854248 3ea1e1812a2daa168a9533176fe1e074 http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_mipsel.deb Size/MD5 checksum: 179608 8541d8cbfbe953440b3ef5dfd517b63e http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_mipsel.deb Size/MD5 checksum: 9301454 7f1090c461b1770d05c8ded4308f1e89 http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_mipsel.deb Size/MD5 checksum: 364882 c8bc7c3b7c605e37af80ebce9eea919a http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_mipsel.deb Size/MD5 checksum: 426150 401882418c4e16b3e58a99d8b021f8b7 http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_mipsel.deb Size/MD5 checksum: 635298 81f659a808b56347b350ad675e0c29ce http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_mipsel.deb Size/MD5 checksum: 175152 4440f5cfc45930032d5b7ee149c8ffa8 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_powerpc.deb Size/MD5 checksum: 181496 f05c77fa28abd1aafcc376ae4e28c587 http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_powerpc.deb Size/MD5 checksum: 405258 3bd384a4001434b69039dd3bb1437826 http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_powerpc.deb Size/MD5 checksum: 636532 7434d9bb7f4657e77204fa5f708b3421 http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_powerpc.deb Size/MD5 checksum: 856934 13a0e913693e549c7562afbe59ee2cc0 http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_powerpc.deb Size/MD5 checksum: 377756 8a28b60a850123a811317bf1ab752947 http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_powerpc.deb Size/MD5 checksum: 9301808 ff846ca9fe56ce38d25a00ee83cecc2a http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_powerpc.deb Size/MD5 checksum: 175654 52166fa0e96a3fbed8c47600bd9b6ccb s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_s390.deb Size/MD5 checksum: 854876 4eb7c4af3574b496997a79de2c00bd59 http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_s390.deb Size/MD5 checksum: 390766 6f40991adee8e0877e9e0968240fc299 http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_s390.deb Size/MD5 checksum: 176048 ce6514408234d53d0e09e78de7b34b60 http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_s390.deb Size/MD5 checksum: 176232 f26d9e37a2b5b6e2ebc11408c2a1c87e http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_s390.deb Size/MD5 checksum: 401248 30566a8c06b87fa9226e3ee490ed985f http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_s390.deb Size/MD5 checksum: 627618 c46d97bd8cf40a85cb8882df6e554913 http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_s390.deb Size/MD5 checksum: 9300662 5a58ee27fad028c3e8e4632426cce41c sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_sparc.deb Size/MD5 checksum: 9298416 e3846fca2a382ccc5596d04e9a5ab469 http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_sparc.deb Size/MD5 checksum: 583752 1085766a6eb6e086a745b65c8d65f3cd http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_sparc.deb Size/MD5 checksum: 171712 0be51d03cf3b023cf6e5899d6b71d798 http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_sparc.deb Size/MD5 checksum: 388500 3cb57fbe22b4fb9d4fad41e9b7d25ed8 http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_sparc.deb Size/MD5 checksum: 376772 3e724ed0289a2c8d42e6cde9155cb4b3 http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_sparc.deb Size/MD5 checksum: 850984 cd8672207fe749f42f909fb135f3ab06 http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_sparc.deb Size/MD5 checksum: 173342 e6a2627dffed9ac3afe3716271d8efb1 These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGUcZIYrVLjBFATsMRAp2WAJ9q35hvpPisSMBrSTmKU7U/+ZWSfACfS41Y SbsLWkL6iDeQL6cneMDL+3k= =EalO - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRlTciih9+71yA2DNAQKKmgP/TlcyIYSi/H8OD9IGBv4i44iaYjWMZ6Mc NOqfo+QDuF84674Zul5TG7d/YEoj9lxXNF2DPBVQUt6pUKkQYpbZ/FODkLJ/BTCM 5lM0Uz86lyJle/iQsCC5lY44dILV8nC/+Y3J+4vgwrrDs6NgxHfuTMnI42xMX9Vh kLFW9osERUc= =vZBn -----END PGP SIGNATURE-----