ALT-BU-2018-3036-1
Branch p8 update bulletin.
Package thunderbird updated to version 52.6.0-alt0.M80P.1 for branch p8 in task 198696.
Closed vulnerabilities
BDU:2021-00020
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00021
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00022
Уязвимость библиотеки Skia браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00049
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения при преобразований XSL, позволяющая нарушителю выполнить произвольный код
BDU:2021-00050
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2021-00066
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием после освобождениям при манипулировании медиа-элементами HTML, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2021-00067
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием после освобождениям, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2021-00068
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность информации
Modified: 2024-11-21
CVE-2018-5089
Memory safety bugs were reported in Firefox 57 and Firefox ESR 52.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1412420%2C1426783%2C1422389%2C1415598%2C1410134%2C1408017%2C1224396%2C1382366%2C1415582%2C1417797%2C1409951%2C1414452%2C1428589%2C1425780%2C1399520%2C1418854%2C1408276%2C1412145%2C1331209%2C1425612
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1412420%2C1426783%2C1422389%2C1415598%2C1410134%2C1408017%2C1224396%2C1382366%2C1415582%2C1417797%2C1409951%2C1414452%2C1428589%2C1425780%2C1399520%2C1418854%2C1408276%2C1412145%2C1331209%2C1425612
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- USN-3688-1
- USN-3688-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5095
An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 8 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1418447
- https://bugzilla.mozilla.org/show_bug.cgi?id=1418447
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5096
A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.6 and Thunderbird < 52.6.
- 102771
- 102771
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1418922
- https://bugzilla.mozilla.org/show_bug.cgi?id=1418922
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5097
A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1387427
- https://bugzilla.mozilla.org/show_bug.cgi?id=1387427
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5098
A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1399400
- https://bugzilla.mozilla.org/show_bug.cgi?id=1399400
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5099
A use-after-free vulnerability can occur when the widget listener is holding strong references to browser objects that have previously been freed, resulting in a potentially exploitable crash when these references are used. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1416878
- https://bugzilla.mozilla.org/show_bug.cgi?id=1416878
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5102
A use-after-free vulnerability can occur when manipulating HTML media elements with media streams, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1419363
- https://bugzilla.mozilla.org/show_bug.cgi?id=1419363
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5103
A use-after-free vulnerability can occur during mouse event handling due to issues with multiprocess support. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1423159
- https://bugzilla.mozilla.org/show_bug.cgi?id=1423159
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5104
A use-after-free vulnerability can occur during font face manipulation when a font face is freed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1425000
- https://bugzilla.mozilla.org/show_bug.cgi?id=1425000
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5117
If right-to-left text is used in the addressbar with left-to-right alignment, it is possible in some circumstances to scroll this text to spoof the displayed URL. This issue could result in the wrong URL being displayed as a location, which can mislead users to believe they are on a different site than the one loaded. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1395508
- https://bugzilla.mozilla.org/show_bug.cgi?id=1395508
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Closed bugs
Обновить fuse до >=2.9.7
Closed vulnerabilities
BDU:2017-01850
Уязвимость функции wwunpack (libclamav/wwunpack.c) средства антивирусной защиты Clam Antivirus, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-01851
Уязвимость компонента libclamav/message.c средства антивирусной защиты Clam Antivirus, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00337
Уязвимость функции messageAddArgument (message.c) средства антивирусной защиты Clam Antivirus, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2018-00338
Уязвимость функции lzma_bswap_4861dc средства антивирусной защиты Clam Antivirus, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2017-12374
The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations (mbox.c operations on bounce messages). If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition.
- http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
- http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
- https://bugzilla.clamav.net/show_bug.cgi?id=11939
- https://bugzilla.clamav.net/show_bug.cgi?id=11939
- [debian-lts-announce] 20180128 [SECURITY] [DLA 1261-1] clamav security update
- [debian-lts-announce] 20180128 [SECURITY] [DLA 1261-1] clamav security update
- USN-3550-1
- USN-3550-1
- USN-3550-2
- USN-3550-2
Modified: 2024-11-21
CVE-2017-12375
The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions (the rfc2047 function in mbox.c). An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device.
- http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
- http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
- https://bugzilla.clamav.net/show_bug.cgi?id=11940
- https://bugzilla.clamav.net/show_bug.cgi?id=11940
- [debian-lts-announce] 20180128 [SECURITY] [DLA 1261-1] clamav security update
- [debian-lts-announce] 20180128 [SECURITY] [DLA 1261-1] clamav security update
- USN-3550-1
- USN-3550-1
- USN-3550-2
- USN-3550-2
Modified: 2024-11-21
CVE-2017-12376
ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause a handle_pdfname (in pdf.c) buffer overflow when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code.
- http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
- http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
- https://bugzilla.clamav.net/show_bug.cgi?id=11942
- https://bugzilla.clamav.net/show_bug.cgi?id=11942
- [debian-lts-announce] 20180128 [SECURITY] [DLA 1261-1] clamav security update
- [debian-lts-announce] 20180128 [SECURITY] [DLA 1261-1] clamav security update
- USN-3550-1
- USN-3550-1
- USN-3550-2
- USN-3550-2
Modified: 2024-11-21
CVE-2017-12377
ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap-based buffer over-read condition in mew.c when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device.
- http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
- http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
- https://bugzilla.clamav.net/show_bug.cgi?id=11943
- https://bugzilla.clamav.net/show_bug.cgi?id=11943
- [debian-lts-announce] 20180128 [SECURITY] [DLA 1261-1] clamav security update
- [debian-lts-announce] 20180128 [SECURITY] [DLA 1261-1] clamav security update
- USN-3550-1
- USN-3550-1
- USN-3550-2
- USN-3550-2
Modified: 2024-11-21
CVE-2017-12378
ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device.
- http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
- http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
- https://bugzilla.clamav.net/show_bug.cgi?id=11946
- https://bugzilla.clamav.net/show_bug.cgi?id=11946
- [debian-lts-announce] 20180128 [SECURITY] [DLA 1261-1] clamav security update
- [debian-lts-announce] 20180128 [SECURITY] [DLA 1261-1] clamav security update
- USN-3550-1
- USN-3550-1
- USN-3550-2
- USN-3550-2
Modified: 2024-11-21
CVE-2017-12379
ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in the message parsing function on an affected system. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a messageAddArgument (in message.c) buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition or execute arbitrary code on an affected device.
- http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
- http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
- https://bugzilla.clamav.net/show_bug.cgi?id=11944
- https://bugzilla.clamav.net/show_bug.cgi?id=11944
- [debian-lts-announce] 20180128 [SECURITY] [DLA 1261-1] clamav security update
- [debian-lts-announce] 20180128 [SECURITY] [DLA 1261-1] clamav security update
- USN-3550-1
- USN-3550-1
- USN-3550-2
- USN-3550-2
Modified: 2024-11-21
CVE-2017-12380
ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.
- http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
- http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
- https://bugzilla.clamav.net/show_bug.cgi?id=11945
- https://bugzilla.clamav.net/show_bug.cgi?id=11945
- [debian-lts-announce] 20180128 [SECURITY] [DLA 1261-1] clamav security update
- [debian-lts-announce] 20180128 [SECURITY] [DLA 1261-1] clamav security update
- USN-3550-1
- USN-3550-1
- USN-3550-2
- USN-3550-2
Modified: 2024-11-21
CVE-2017-6418
libclamav/message.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted e-mail message.
- 100154
- 100154
- https://bugzilla.clamav.net/show_bug.cgi?id=11797
- https://bugzilla.clamav.net/show_bug.cgi?id=11797
- https://github.com/varsleak/varsleak-vul/blob/master/clamav-vul/heap-overflow/clamav_email_crash.md
- https://github.com/varsleak/varsleak-vul/blob/master/clamav-vul/heap-overflow/clamav_email_crash.md
- https://github.com/vrtadmin/clamav-devel/commit/586a5180287262070637c8943f2f7efd652e4a2c
- https://github.com/vrtadmin/clamav-devel/commit/586a5180287262070637c8943f2f7efd652e4a2c
- GLSA-201804-16
- GLSA-201804-16
Modified: 2024-11-21
CVE-2017-6420
The wwunpack function in libclamav/wwunpack.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression.
- https://bugzilla.clamav.net/show_bug.cgi?id=11798
- https://bugzilla.clamav.net/show_bug.cgi?id=11798
- https://github.com/varsleak/varsleak-vul/blob/master/clamav-vul/use-after-free/clamav-use-after-free-pe.md
- https://github.com/varsleak/varsleak-vul/blob/master/clamav-vul/use-after-free/clamav-use-after-free-pe.md
- https://github.com/vrtadmin/clamav-devel/commit/dfc00cd3301a42b571454b51a6102eecf58407bc
- https://github.com/vrtadmin/clamav-devel/commit/dfc00cd3301a42b571454b51a6102eecf58407bc
- GLSA-201804-16
- GLSA-201804-16