Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 




      :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: @RISK: The Consensus Security Vulnerability Alert Vol. 7 No. 16


(2) CRITICAL: ClamAV Multiple Vulnerabilities
ClamAV versions prior to 0.93

Description: ClamAV is a popular open source antivirus solution for
multiple platforms. Flaws in its handling of a variety of file formats
can lead to buffer overflows and memory corruption vulnerabilities. A
specially crafted file analyzed by the software could trigger one of
these vulnerabilities, allowing an attacker to execute arbitrary code
with the privileges of the vulnerable process. Note that, on systems
using ClamAV as an email analysis engine, it is sufficient for an email
message to transit the server to exploit one of these vulnerabilities;
no user interaction is necessary. Full technical details for these
vulnerabilities is available via source code analysis. Several
proofs-of-concept are publicly available.

Status: ClamAV confirmed, updates available.

iDefense Security Advisories
ClamAV Bug Reports
Secunia Security Advisory
ClamAV Home Page
SecurityFocus BID
Not yet available.

(5) HIGH: ICQ Message Handling Buffer Overflow
ICQ versions 6.0 and prior

Description: ICQ is a popular instant messaging application. It contains
a flaw in its handling of remote "user status messages". These messages
are used to indicate the status of another user, such as "available" or
"away". These messages will be rendered by a remote client when querying
the user's status. There is a flaw in the handling of these messages. A
specially crafted message could trigger a buffer overflow when rendered
by a victim's client, allowing an attacker to execute arbitrary code
with the privileges of the current user. A user would have to be
monitoring the status of an attacker to be vulnerable to this issue.
Full technical details and a proof-of-concept are publicly available for
this vulnerability.

Status:  Vendor confirmed, updates available.

INFIGO Security Advisory
ICQ Home Page
SecurityFocus BID
Not yet available.


(8) LOW: Mozilla Web Browsers Garbage Collection Possible Remote Code Execution
Mozilla Firefox versions prior to
Mozilla Thunderbird versions prior to
Mozilla SeaMonkey versions prior to 1.1.10

Description: Web browsers that are based on the Mozilla codebase,
including the popular Firefox web browser, contain a flaw in their
handling of certain JavaScript constructs. The JavaScript engine in
these browsers has a flaw in its implementation of garbage collection
(a method of automatic memory management). A specially crafted
JavaScript script embedded in a web page could exploit this
vulnerability and lead to a crash. It is not currently believed that
this crash could be leveraged to execute arbitrary code, but similar
bugs in the past have lead to remote code execution. Full technical
details are available for this vulnerability via source code analysis.

Status: Mozilla confirmed, updates available.

Mozilla Security Advisory
Wikipedia Article on Garbage Collection
Wikipedia Article on JavaScript
Mozilla Home Page
SecurityFocus BID



Copyright © Lexa Software, 1996-2009.