Security advisory: clamav (CVE-2006-0162)

classic Classic list List threaded Threaded
2 messages Options
Reply | Threaded
Open this post in threaded view
|

Security advisory: clamav (CVE-2006-0162)

Yaakov (Cygwin/X)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

clamav maintainer,

ClamAV < 0.88 is vulnerable to a buffer overflow which may lead to
remote execution of arbitrary code.

Please update clamav to 0.88 ASAP.

More information:
http://security.gentoo.org/glsa/glsa-200601-07.xml
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0162
http://sourceforge.net/project/shownotes.php?release_id=384086


Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (Cygwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDx/7JpiWmPGlmQSMRAklBAKDDQHMyEGmuYwWhEdmmuG2scuCNEQCgjK/P
e/j9m3BPAWKfGCMWD8GUdjY=
=zAHO
-----END PGP SIGNATURE-----
Reply | Threaded
Open this post in threaded view
|

Re: Security advisory: clamav (CVE-2006-0162)

Yaakov (Cygwin/X)
Yaakov S (Cygwin Ports) wrote:

> clamav maintainer,
>
> ClamAV < 0.88 is vulnerable to a buffer overflow which may lead to
> remote execution of arbitrary code.
>
> Please update clamav to 0.88 ASAP.
>
> More information:
> http://security.gentoo.org/glsa/glsa-200601-07.xml
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0162
> http://sourceforge.net/project/shownotes.php?release_id=384086

Ping?


Yaakov