Operating System:

[Debian]

Published:

11 October 2019

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3802
                          clamav security update
                              11 October 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           clamav
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-12900 CVE-2019-12625 

Reference:         ESB-2019.3719
                   ESB-2019.3701

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : clamav
Version        : 0.101.4+dfsg-0+deb8u1
CVE ID         : CVE-2019-12625 CVE-2019-12900
Debian Bug     : 34359

It was discovered that clamav, the open source antivirus engine, is affected by
the following security vulnerabilities:

CVE-2019-12625

    Denial of Service (DoS) vulnerability, resulting from excessively long scan
    times caused by non-recursive zip bombs. Among others, this issue was
    mitigated by introducing a scan time limit.

CVE-2019-12900

    Out-of-bounds write in ClamAV's NSIS bzip2 library when attempting
    decompression in cases where the number of selectors exceeded the max limit
    set by the library.

This update triggers a transition from libclamav7 to libclama9. As a result,
several other packages will be recompiled against the fixed package after the
release of this update: dansguardian, havp, python-pyclamav, c-icap-modules.

For Debian 8 "Jessie", these problems have been fixed in version
0.101.4+dfsg-0+deb8u1.

We recommend that you upgrade your clamav packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=qTUn
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=l8g9
-----END PGP SIGNATURE-----