---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Mandriva update for clamav SECUNIA ADVISORY ID: SA26226 VERIFY ADVISORY: http://secunia.com/advisories/26226/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Mandriva Linux 2007 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA26038 SOLUTION: Apply updated packages. -- Mandriva Linux 2007 -- a1d7123d64b17de98db72e05959657e0 2007.0/i586/clamav-0.91.1-1.1mdv2007.0.i586.rpm 4e814bbff65dc4129f398f72b6d62640 2007.0/i586/clamav-db-0.91.1-1.1mdv2007.0.i586.rpm c6267bcae66562a2458cf9ad5d6de8f4 2007.0/i586/clamav-milter-0.91.1-1.1mdv2007.0.i586.rpm 1f263279bf4cd5460786fe0759c0ec96 2007.0/i586/clamd-0.91.1-1.1mdv2007.0.i586.rpm 0b14d3e33ba65c556cbea0dd4b55a51c 2007.0/i586/clamdmon-0.91.1-1.1mdv2007.0.i586.rpm 2bd3ff262e1f1b5d261e2aa986d23ad5 2007.0/i586/libclamav2-0.91.1-1.1mdv2007.0.i586.rpm b9b0dac5eccf1000b8301187bcad99b2 2007.0/i586/libclamav2-devel-0.91.1-1.1mdv2007.0.i586.rpm d1b697088a726c293ee54cc25b660308 2007.0/SRPMS/clamav-0.91.1-1.1mdv2007.0.src.rpm -- Mandriva Linux 2007/X86_64 -- c0b6dc4ec4ab20dba0129966d42cd75e 2007.0/x86_64/clamav-0.91.1-1.1mdv2007.0.x86_64.rpm 8c28b0917575a5b0f2306f6c30d35df8 2007.0/x86_64/clamav-db-0.91.1-1.1mdv2007.0.x86_64.rpm fbf470d9921d86b6cfbf0b75a8723f71 2007.0/x86_64/clamav-milter-0.91.1-1.1mdv2007.0.x86_64.rpm 9dbff52f73edb4b10efa681b2c3b6b38 2007.0/x86_64/clamd-0.91.1-1.1mdv2007.0.x86_64.rpm 60f9f0b6e869e4931ea6a5e1521d079b 2007.0/x86_64/clamdmon-0.91.1-1.1mdv2007.0.x86_64.rpm 4de72c8d9cd714e0b1b7d9d1aadcb131 2007.0/x86_64/lib64clamav2-0.91.1-1.1mdv2007.0.x86_64.rpm 63dc325ae89be61dca20128ae021a812 2007.0/x86_64/lib64clamav2-devel-0.91.1-1.1mdv2007.0.x86_64.rpm d1b697088a726c293ee54cc25b660308 2007.0/SRPMS/clamav-0.91.1-1.1mdv2007.0.src.rpm -- Mandriva Linux 2007.1 -- 5044c759d6cad93402ddd5350262f5fb 2007.1/i586/clamav-0.91.1-1.1mdv2007.1.i586.rpm 9fdbb064de5d4752bf29b68edf86c9b7 2007.1/i586/clamav-db-0.91.1-1.1mdv2007.1.i586.rpm 0bb59e9542365b9bd1faf3cdb041e1d1 2007.1/i586/clamav-milter-0.91.1-1.1mdv2007.1.i586.rpm 2f95a4750b57cd52a8f8fe30ff62ad85 2007.1/i586/clamd-0.91.1-1.1mdv2007.1.i586.rpm 33548bc49879899559d5700f7ec0add2 2007.1/i586/clamdmon-0.91.1-1.1mdv2007.1.i586.rpm 4dc6d180ee9e306fa5eb3a1dfe81aa9e 2007.1/i586/libclamav2-0.91.1-1.1mdv2007.1.i586.rpm f2e5333e7c60c9cbc7b70f3994a867c3 2007.1/i586/libclamav2-devel-0.91.1-1.1mdv2007.1.i586.rpm fdb6ea9465c87b3206051df922e509d0 2007.1/SRPMS/clamav-0.91.1-1.1mdv2007.1.src.rpm -- Mandriva Linux 2007.1/X86_64 -- 15b628de57bf9b067dfe17e4050eae06 2007.1/x86_64/clamav-0.91.1-1.1mdv2007.1.x86_64.rpm f53ae231e7591079b7a9f88c948527d5 2007.1/x86_64/clamav-db-0.91.1-1.1mdv2007.1.x86_64.rpm be2c036992c7ebd82ffdc45e4679c83c 2007.1/x86_64/clamav-milter-0.91.1-1.1mdv2007.1.x86_64.rpm cabcdcf73a9e49ead2db583e1a55af71 2007.1/x86_64/clamd-0.91.1-1.1mdv2007.1.x86_64.rpm 8f8e068f16c979be31d688069c76b797 2007.1/x86_64/clamdmon-0.91.1-1.1mdv2007.1.x86_64.rpm c37ebfab59ca964727252852af351988 2007.1/x86_64/lib64clamav2-0.91.1-1.1mdv2007.1.x86_64.rpm 744eaf423e847ad4ed1204cfde0bac22 2007.1/x86_64/lib64clamav2-devel-0.91.1-1.1mdv2007.1.x86_64.rpm fdb6ea9465c87b3206051df922e509d0 2007.1/SRPMS/clamav-0.91.1-1.1mdv2007.1.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2007:150 OTHER REFERENCES: SA26038: http://secunia.com/advisories/26038/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------