S-274: ClamAV Vulnerabilities


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-274: ClamAV Vulnerabilities
# 1  
Old 04-25-2008
S-274: ClamAV Vulnerabilities

Several remote vulnerabilities have been discovered in the Clam anti-virus toolkit which could lead to the execution of arbitrary code. The risk is MEDIUM. A buffer overflow inthe handler for PeSpin or Upack PE binaries may lead the the execution of arbitrary code.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Script for clamav help

Hi there all, I am writing a script to run clamscan and email me the results, everything is working fine still it comes to mailing me the results. Any and all help is much welcomed. #!/bin/sh # # Script Written by Jonathan Wood # Varables to change mailrecp="mail@home.jwservices.co.nz" ... (4 Replies)
Discussion started by: jonnowood
4 Replies

2. UNIX and Linux Applications

ClamAV/other AV. Possible to make portable?

Hey guys/gals, I work with a large amount of servers, and was just curious if it is possible to make a linux AV app, portable. What i mean is, I go to a user's home directory and do something like ./clamavscan (I suppose an alias for clamscan..), and it scans the user's home directory for... (2 Replies)
Discussion started by: Rhije
2 Replies
Login or Register to Ask a Question
clamav-unofficial-sigs(8)					  SCRIPT COMMANDS					 clamav-unofficial-sigs(8)

NAME
clamav-unofficial-sigs - Download, test, and install third-party ClamAV signature databases. SYNOPSIS
clamav-unofficial-sigs [options] DESCRIPTION
clamav-unofficial-sigs is a shell script that updates the Sanesecurity, SecuriteInfo, MalwarePatrol, OITC, INetMsg and ScamNailer third- party signature databases for ClamAV. OPTIONS
This script follows the standard GNU command line syntax. A summary of the options is shown below. -b Add a bypass signature entry to local.ign in order to temporarily resolve a false-positive issue with a third-party signature. The script will monitor any entries it makes to local.ign and will automatically remove bypass entries if either the original signature has been modified or removed from the database. -c FILE-NAME Source configuration information from a different file. -d Decode a hexadecimal encoded string or an individual ClamAV 3rd-party signature for viewing. This will not decode image signatures nor the official signatures. -e Encode a entire input string in hexadecimal for signature usage in any *.ndb database. -f Encode a formated input string in hexadecimal that contains spacing field '{}, (), *', without encoding the spacing fields, for sig- nature usage in any '*.ndb' database. -g FILE-NAME Verify the GPG signature for a specific SaneSecurity database file. Only specify the filename as listed in the configuration file and the script will search for it in the work directory. -h Print the script help and usage information. -i Print system and script configuration information. -m Make a hexadecimal signature database file (*.ndb) from a clear text ascii file. Provides support for both full and formatted sig- natures. Additional information is provided when using the flag. -r Remove the clamav-unofficial-sigs script and all of its associated files, databases and work directories from the system. -s FILE-NAME Test the integrity of a third-party signature database with clamscan. Only specify the filename as listed in the configuration file and the script will search for it in the work directory. -t If HAM directory scanning is enabled in the script's configuration file, then output the names of any third-party signatures that triggered during the HAM directory scan. -v Print the script version and date information. SEE ALSO
clamd(8), clamscan(1) COPYRIGHT
Bill Landry <bill@inetmsg.com> LICENSE
BSD (Berkeley Software Distribution) BUGS
Report bugs to Bill Landry <bill@inetmsg.com> AUTHOR
Bill Landry <bill@inetmsg.com> Version 3.7.1 June 6, 2010 clamav-unofficial-sigs(8)