SB2018013106 - Arch Linux update for clamav
Published: January 31, 2018
Security Bulletin ID
SB2018013106
Severity
High
Patch available
YES
Number of vulnerabilities
9
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 9 secuirty vulnerabilities.
1) Use-after-free error (CVE-ID: CVE-2017-12374)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to input validation checking mechanisms during parsing mbox.c operations on bounce messages. A remote attacker can send a specially crafted input, trigger use-after-free error and cause the service to crash.
2) Buffer overflow (CVE-ID: CVE-2017-12375)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to input validation checking mechanisms during parsing the rfc2047 function in mbox. A remote attacker can send a specially crafted input, trigger buffer overflow and cause the service to crash.
3) Buffer overflow (CVE-ID: CVE-2017-12376)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists due to input validation checking mechanisms when handling Portable Document Format (.pdf) files. A remote attacker can send a specially crafted .pdf file, trigger handle_pdfname (in pdf.c) buffer overflow and cause the service to crash or execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
4) Heap-based buffer over-read (CVE-ID: CVE-2017-12377)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists due to input validation checking mechanisms in mew packet files. A remote attacker can send a specially crafted .pdf file, trigger a heap-based buffer over-read condition in mew.c and cause the service to crash or execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
5) Buffer over-read (CVE-ID: CVE-2017-12378)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to input validation checking mechanisms of .tar (Tape Archive) files. A remote attacker can send a specially crafted input, trigger checksum buffer over-read condition and cause the service to crash.
6) Buffer overflow (CVE-ID: CVE-2017-12379)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists due to input validation checking mechanisms in the message parsing function. A remote attacker can send a specially crafted email, trigger a messageAddArgument (in message.c) buffer overflow condition and cause the service to crash or execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
7) Null pointer dereference (CVE-ID: CVE-2017-12380)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to input validation checking mechanisms during parsing the rfc2047 function in mbox.c during certain mail parsing functions. A remote attacker can send a specially crafted email, trigger a NULL pointer dereference condition and cause the service to crash.
8) Out-of-bounds read (CVE-ID: CVE-2017-6418)
The vulnerability allows a rmeote attacker to cause DoS condition on the target system.The weakness exists in libclamav/message.c due to out-of-bounds read. A remote attacker can trick the victim into opening a specially crafted e-mail message, trigger memory corruption and cause the service to crash.
9) Use-after-free error (CVE-ID: CVE-2017-6420)
The vulnerability allows a rmeote attacker to cause DoS condition on the target system.The weakness exists in libclamav/wwunpack.c due to use-after-free error. A remote attacker can trick the victim into opening a specially crafted PE file with WWPack compression, trigger memory corruption and cause the service to crash.
Remediation
Install update from vendor's website.