SB2018012608 - Gentoo update for ClamAV 



SB2018012608 - Gentoo update for ClamAV

Published: January 26, 2018

Security Bulletin ID SB2018012608
Severity
High
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 43% Low 57%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Use-after-free error (CVE-ID: CVE-2017-12374)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to input validation checking mechanisms during parsing mbox.c operations on bounce messages. A remote attacker can send a specially crafted input, trigger use-after-free error and cause the service to crash.

2) Buffer overflow (CVE-ID: CVE-2017-12375)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to input validation checking mechanisms during parsing the rfc2047 function in mbox. A remote attacker can send a specially crafted input, trigger buffer overflow and cause the service to crash.

3) Buffer overflow (CVE-ID: CVE-2017-12376)

The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists due to input validation checking mechanisms when handling Portable Document Format (.pdf) files. A remote attacker can send a specially crafted .pdf file, trigger handle_pdfname (in pdf.c) buffer overflow and cause the service to crash or execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

4) Heap-based buffer over-read (CVE-ID: CVE-2017-12377)

The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists due to input validation checking mechanisms in mew packet files. A remote attacker can send a specially crafted .pdf file, trigger a heap-based buffer over-read condition in mew.c and cause the service to crash or execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

5) Buffer over-read (CVE-ID: CVE-2017-12378)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to input validation checking mechanisms of .tar (Tape Archive) files. A remote attacker can send a specially crafted input, trigger checksum buffer over-read condition and cause the service to crash.

6) Buffer overflow (CVE-ID: CVE-2017-12379)

The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists due to input validation checking mechanisms in the message parsing function. A remote attacker can send a specially crafted email, trigger a messageAddArgument (in message.c) buffer overflow condition and cause the service to crash or execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

7) Null pointer dereference (CVE-ID: CVE-2017-12380)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to input validation checking mechanisms during parsing the rfc2047 function in mbox.c during certain mail parsing functions. A remote attacker can send a specially crafted email, trigger a NULL pointer dereference condition and cause the service to crash.

Remediation

Install update from vendor's website.