From owner-freebsd-ports-bugs@FreeBSD.ORG Mon Nov 10 11:20:05 2008 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 377F9106567C; Mon, 10 Nov 2008 11:20:05 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id CC2988FC49; Mon, 10 Nov 2008 11:20:03 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id mAABK2Ga061295; Mon, 10 Nov 2008 11:20:02 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id mAABK2jO061294; Mon, 10 Nov 2008 11:20:02 GMT (envelope-from gnats) Resent-Date: Mon, 10 Nov 2008 11:20:02 GMT Resent-Message-Id: <200811101120.mAABK2jO061294@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Cc: garga@FreeBSD.org, freebsd-security@FreeBSD.org, secteam@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Eygene Ryabinkin Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 9227A1065673 for ; Mon, 10 Nov 2008 11:19:46 +0000 (UTC) (envelope-from rea-fbsd@codelabs.ru) Received: from 0.mx.codelabs.ru (0.mx.codelabs.ru [144.206.177.45]) by mx1.freebsd.org (Postfix) with ESMTP id 3A70F8FC14 for ; Mon, 10 Nov 2008 11:19:46 +0000 (UTC) (envelope-from rea-fbsd@codelabs.ru) Received: from void.codelabs.ru (void.codelabs.ru [144.206.177.25]) by 0.mx.codelabs.ru with esmtps (TLSv1:CAMELLIA256-SHA:256) id 1KzUo5-0000el-3V for FreeBSD-gnats-submit@freebsd.org; Mon, 10 Nov 2008 14:19:45 +0300 Message-Id: <20081110111944.ADFC11AF424@void.codelabs.ru> Date: Mon, 10 Nov 2008 14:19:44 +0300 (MSK) From: Eygene Ryabinkin To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 X-GNATS-Notify: garga@FreeBSD.org, freebsd-security@freebsd.org, secteam@freebsd.org Cc: Subject: ports/128749: [vuxml] VBA parser vulnerability in ClamAV < 0.94.1 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Eygene Ryabinkin List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 10 Nov 2008 11:20:05 -0000 >Number: 128749 >Category: ports >Synopsis: [vuxml] VBA parser vulnerability in ClamAV < 0.94.1 >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Mon Nov 10 11:20:02 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release: FreeBSD 7.1-PRERELEASE i386 >Organization: Code Labs >Environment: System: FreeBSD 7.1-PRERELEASE i386 >Description: As was recently reported in the BugTraq list, VBA parser in ClamAV is contains the off-by-one overflow and can lead to the arbitrary code execution within the clamd process. VBA component seem to be unconditionally included to the libclamav and OLE2 scanning is "on" by-default. >How-To-Repeat: http://www.securityfocus.com/archive/1/498169/30/0/threaded >Fix: The following VuXML entry describes this issue: --- vuln.xml begins here --- clamav -- off-by-one heap overflow in VBA project parser clamav 0.94.1

Advisory from Moritz Jodeit, November 8th, 2008:

ClamAV contains an off-by-one heap overflow vulnerability in the code responsible for parsing VBA project files. Successful exploitation could allow an attacker to execute arbitrary code with the privileges of the `clamd' process by sending an email with a prepared attachment.

A VBA project file embedded inside an OLE2 office document send as an attachment can trigger the off-by-one.

Entry from Thu Oct 30 13:52:42 CET 2008 (acab) in ChangeLog:

libclamav/vba_extract.c: get_unicode_name off-by-one, bb#1239 reported by Moritz Jodeit >moritz*jodeit.org<

http://www.securityfocus.com/archive/1/498169/30/0/threaded http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog 2008-11-08
--- vuln.xml ends here --- FreeBSD port itself is already at 0.94.1, so it is fully patched. >Release-Note: >Audit-Trail: >Unformatted: