SB2018012806 - OpenSUSE Linux update for clamav 



SB2018012806 - OpenSUSE Linux update for clamav

Published: January 28, 2018 Updated: July 30, 2018

Security Bulletin ID SB2018012806
Severity
High
Patch available
YES
Number of vulnerabilities 11
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 36% Low 64%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 11 secuirty vulnerabilities.


1) Stack-based buffer over-read (CVE-ID: CVE-2017-11423)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the cabd_read_string function due to stack-based buffer over-read. A remote attacker can send a specially crafted CAB file, trick the victim into opening it, trigger memory corruption and cause the service to crash.


2) Use-after-free error (CVE-ID: CVE-2017-12374)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to input validation checking mechanisms during parsing mbox.c operations on bounce messages. A remote attacker can send a specially crafted input, trigger use-after-free error and cause the service to crash.

3) Buffer overflow (CVE-ID: CVE-2017-12375)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to input validation checking mechanisms during parsing the rfc2047 function in mbox. A remote attacker can send a specially crafted input, trigger buffer overflow and cause the service to crash.

4) Buffer overflow (CVE-ID: CVE-2017-12376)

The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists due to input validation checking mechanisms when handling Portable Document Format (.pdf) files. A remote attacker can send a specially crafted .pdf file, trigger handle_pdfname (in pdf.c) buffer overflow and cause the service to crash or execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

5) Heap-based buffer over-read (CVE-ID: CVE-2017-12377)

The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists due to input validation checking mechanisms in mew packet files. A remote attacker can send a specially crafted .pdf file, trigger a heap-based buffer over-read condition in mew.c and cause the service to crash or execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

6) Buffer over-read (CVE-ID: CVE-2017-12378)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to input validation checking mechanisms of .tar (Tape Archive) files. A remote attacker can send a specially crafted input, trigger checksum buffer over-read condition and cause the service to crash.

7) Buffer overflow (CVE-ID: CVE-2017-12379)

The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists due to input validation checking mechanisms in the message parsing function. A remote attacker can send a specially crafted email, trigger a messageAddArgument (in message.c) buffer overflow condition and cause the service to crash or execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

8) Null pointer dereference (CVE-ID: CVE-2017-12380)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to input validation checking mechanisms during parsing the rfc2047 function in mbox.c during certain mail parsing functions. A remote attacker can send a specially crafted email, trigger a NULL pointer dereference condition and cause the service to crash.

9) Out-of-bounds read (CVE-ID: CVE-2017-6418)

The vulnerability allows a rmeote attacker to cause DoS condition on the target system.

The weakness exists in libclamav/message.c due to out-of-bounds read. A remote attacker can trick the victim into opening a specially crafted e-mail message, trigger memory corruption and cause the service to crash.

10) Heap-based buffer overflow (CVE-ID: CVE-2017-6419)

The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists due to heap-based buffer overflow. A remote attacker can send a specially crafted CHM file, trick the victim into opening it and cause the service to crash or execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.


11) Use-after-free error (CVE-ID: CVE-2017-6420)

The vulnerability allows a rmeote attacker to cause DoS condition on the target system.

The weakness exists in libclamav/wwunpack.c due to use-after-free error. A remote attacker can trick the victim into opening a specially crafted PE file with WWPack compression, trigger memory corruption and cause the service to crash.

Remediation

Install update from vendor's website.