MGASA-2016-0402

Source
https://advisories.mageia.org/MGASA-2016-0402.html
Import Source
https://advisories.mageia.org/MGASA-2016-0402.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0402
Related
Published
2016-11-27T12:34:14Z
Modified
2016-11-27T12:24:15Z
Summary
Updated clamav packages fix security vulnerability
Details

ClamAV (aka Clam AntiVirus) before 0.99.2 allows remote attackers to cause a denial of service (application crash) via a crafted mew packer executable (CVE-2016-1371).

ClamAV (aka Clam AntiVirus) before 0.99.2 allows remote attackers to cause a denial of service (application crash) via a crafted 7z file (CVE-2016-1372).

libclamav in ClamAV (aka Clam AntiVirus), as used in Advanced Malware Protection (AMP) on Cisco Email Security Appliance (ESA) devices before 9.7.0-125 and Web Security Appliance (WSA) devices before 9.0.1-135 and 9.1.x before 9.1.1-041, allows remote attackers to cause a denial of service (AMP process restart) via a crafted document (CVE-2016-1405).

The clavav package has been updated to version 0.99.2, fixing these issues and other bugs. See the upstream release announcements for details.

References
Credits

Affected packages

Mageia:5 / clamav

Package

Name
clamav
Purl
pkg:rpm/mageia/clamav?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.99.2-1.mga5

Ecosystem specific

{
    "section": "core"
}