USN-3393-2: ClamAV vulnerabilities
17 August 2017
Several security issues were fixed in ClamAV.
Releases
Packages
- clamav - Anti-virus utility for Unix
Details
USN-3393-1 fixed several vulnerabilities in ClamAV. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that ClamAV incorrectly handled parsing certain e-mail
messages. A remote attacker could possibly use this issue to cause ClamAV
to crash, resulting in a denial of service. (CVE-2017-6418)
It was discovered that ClamAV incorrectly handled certain malformed CHM
files. A remote attacker could use this issue to cause ClamAV to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 14.04 LTS. In the default installation,
attackers would be isolated by the ClamAV AppArmor profile. (CVE-2017-6419)
It was discovered that ClamAV incorrectly handled parsing certain PE files
with WWPack compression. A remote attacker could possibly use this issue to
cause ClamAV to crash, resulting in a denial of service. (CVE-2017-6420)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3393-1: clamav-milter, clamav-docs, clamav-daemon, clamav-testfiles, clamdscan, clamav, libclamav-dev, libclamav7, clamav-base, clamav-freshclam
- USN-3394-1: libmspack, libmspack-dev, libmspack0, libmspack-doc