Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 16 Jul 2020 16:52:04 -0600
From:      The Doctor <doctor@doctor.nl2k.ab.ca>
To:        freebsd-ports@freebsd.org
Subject:   [jesler@cisco.com: [Clamav-announce] ClamAV? blog: ClamAV 0.102.4 security patch released]
Message-ID:  <20200716225204.GA60260@doctor.nl2k.ab.ca>

next in thread | raw e-mail | index | archive | help
Heads up!

----- Forwarded message from "Joel Esler (jesler)" <jesler@cisco.com> -----

Date: Thu, 16 Jul 2020 19:32:35 +0000
From: "Joel Esler (jesler)" <jesler@cisco.com>
To: ClamAV users ML <clamav-users@lists.clamav.net>, ClamAV Development
	<clamav-devel@lists.clamav.net>, "clamav-announce@lists.clamav.net"
	<clamav-announce@lists.clamav.net>
Subject: [Clamav-announce] ClamAV? blog: ClamAV 0.102.4 security patch released
x-mailer: Apple Mail (2.3608.120.23.2.1)


> https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html <https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html>;

ClamAV 0.102.4 is out now. Users can head over to clamav.net/downloads <https://www.clamav.net/downloads>; to download the release materials.

ClamAV 0.102.4 is a bug patch release to address the following issues:

CVE-2020-3350 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3350>Fixed a vulnerability a malicious user could exploit to replace a scan target's directory with a symlink to another path to trick clamscan, clamdscan, or clamonacc into removing or moving a different file (such as a critical system file). The issue would affect users that use the --move or --remove options for clamscan, clamdscan and clamonacc.

For more information about AV quarantine attacks using links, see RACK911 Lab's report <https://www.rack911labs.com/research/exploiting-almost-every-antivirus-software>.

CVE-2020-3327 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3327>Fixed a vulnerability in the ARJ archive-parsing module in ClamAV 0.102.3 that could cause a denial-of-service (DoS) condition. Improper bounds checking resulted in an out-of-bounds read that could cause a crash. The previous fix for this CVE in version 0.102.3 was incomplete. This fix correctly resolves the issue.

CVE-2020-3481 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3481>Fixed a vulnerability in the EGG archive module in ClamAV 0.102.0 - 0.102.3 that could cause a denial-of-service (DoS) condition. Improper error handling could cause a crash due to a NULL pointer dereference. This vulnerability is mitigated for those using the official ClamAV signature databases because the file type signatures in daily.cvd will not enable the EGG archive parser in affected versions.

We will be publishing a release candidate for version 0.103.0 in the next couple of weeks. Stay tuned!

-- 
Joel Esler
Manager, Communities Division
Cisco Talos Intelligence Group
http://www.talosintelligence.com | https://www.snort.org



_______________________________________________

clamav-announce mailing list
clamav-announce@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-announce

http://www.clamav.net/contact.html#ml


----- End forwarded message -----

-- 
Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca
Yahweh, Queen & country!Never Satan President Republic!Beware AntiChrist rising!
https://www.empire.kred/ROOTNK?t=94a1f39b  
We were not instructed to succumb to the world.  -unknown



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20200716225204.GA60260>