First published: Fri Dec 03 2010(Updated: )
Two flaws were reported to have been corrected in ClamAV 0.96.5 [1]: 1) Multiple errors within the processing of PDF files can be exploited to e.g. cause a crash. (<a href="https://access.redhat.com/security/cve/CVE-2010-4260">CVE-2010-4260</a>) 2) An off-by-one error within the "icon_cb()" function can be exploited to cause a memory corruption. (<a href="https://access.redhat.com/security/cve/CVE-2010-4261">CVE-2010-4261</a>) Current Fedora version of ClamAV is 0.96.4 and is vulnerable to these issues. [1] <a href="http://secunia.com/advisories/42426/">http://secunia.com/advisories/42426/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ClamAV | ||
ClamAV | <0.96.5 | |
ClamAV | <0.96.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-659861 addresses two vulnerabilities in ClamAV 0.96.5 related to processing PDF files and an off-by-one error in the icon_cb() function.
To fix the vulnerabilities in REDHAT-BUG-659861, upgrade ClamAV to version 0.96.5 or later.
The vulnerabilities in REDHAT-BUG-659861 can lead to application crashes when processing malicious PDF documents.
Versions of ClamAV prior to 0.96.5 are affected by the vulnerabilities described in REDHAT-BUG-659861.
Currently, the best approach to mitigate the issues in REDHAT-BUG-659861 is to upgrade to the latest version of ClamAV.