TITLE: Mandriva update for clamav SECUNIA ADVISORY ID: SA18478 VERIFY ADVISORY: http://secunia.com/advisories/18478/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Mandrakelinux 10.1 http://secunia.com/product/4198/ DESCRIPTION: Mandriva has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. For more information: SA18379 SOLUTION: Apply updated packages. Mandrakelinux 10.1: a6f50f607308d688ae0acbb8a03be62f 10.1/RPMS/clamav-0.88-0.1.101mdk.i586.rpm 4a91d81f7ca2baa8392e9822493e9bad 10.1/RPMS/clamav-db-0.88-0.1.101mdk.i586.rpm f37f5611b73a0b39efc030a7380fd231 10.1/RPMS/clamav-milter-0.88-0.1.101mdk.i586.rpm 3a358f56b38d12dd2f406ad01e4d15d1 10.1/RPMS/clamd-0.88-0.1.101mdk.i586.rpm 1073d9acede45ae3712dde6016d93776 10.1/RPMS/libclamav1-0.88-0.1.101mdk.i586.rpm 3ed0c1a49b4a7aaf2438d2c65a14cf46 10.1/RPMS/libclamav1-devel-0.88-0.1.101mdk.i586.rpm 70ca1d9a3498e82d89d1d8a5ef7386f6 10.1/SRPMS/clamav-0.88-0.1.101mdk.src.rpm Mandrakelinux 10.1/X86_64: da3e4a1571a2e98591c6324a06d5dbc1 x86_64/10.1/RPMS/clamav-0.88-0.1.101mdk.x86_64.rpm 1d3a2630d32b08fbb72ccf5543d9ab93 x86_64/10.1/RPMS/clamav-db-0.88-0.1.101mdk.x86_64.rpm 0bb23a740d77e519f79336dd94624995 x86_64/10.1/RPMS/clamav-milter-0.88-0.1.101mdk.x86_64.rpm fcb790c235e892f2bcb3e40073de37dc x86_64/10.1/RPMS/clamd-0.88-0.1.101mdk.x86_64.rpm 5fbe68962ebdb338f7f2dd642af2e2c5 x86_64/10.1/RPMS/lib64clamav1-0.88-0.1.101mdk.x86_64.rpm 588f38077ecc9334d87bc32d55d19693 x86_64/10.1/RPMS/lib64clamav1-devel-0.88-0.1.101mdk.x86_64.rpm 70ca1d9a3498e82d89d1d8a5ef7386f6 x86_64/10.1/SRPMS/clamav-0.88-0.1.101mdk.src.rpm ORIGINAL ADVISORY: http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:016 OTHER REFERENCES: SA18379: http://secunia.com/advisories/18379/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------