-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                         ESB-2007.0340 -- [Debian]
          New clamav packages fix denial of service vulnerability
                                24 May 2007

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              clamav
Publisher:            Debian
Operating System:     Debian GNU/Linux 4.0
Impact:               Denial of Service
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-2029

Ref:                  ESB-2007.0266

Original Bulletin:    http://www.debian.org/security/2007/dsa-1281

Comment: This bulletin references a fix for a PDF handling issue in ClamAV
         from april. The previous patch was not successful in fixing the
         issue and new patches are now available.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1281-2                security@debian.org
http://www.debian.org/security/                         Noah Meyerhans
May 21, 2007
- - ------------------------------------------------------------------------

Package        : clamav
Vulnerability  : file descriptor leak
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2007-2029
BugTraq ID     : 23656

On 25 April, the Debian Security Team released clamav 0.90.1-3etch1, an update
to the Clam anti-virus toolkit, to address several vulnerabilities.
Unfortunately, there was an error in the updated packages and CVE-2007-2029, a
file descriptor leak in the PDF document handler, was not properly fixed in
Debian 4.0 (etch) or the Debian testing distribution (lenny).

This problem has been fixed in version 0.90.1-3etch2 for Debian 4.0 (etch).
The problem will be fixed in testing (lenny) in version
clamav_0.90.1-3.1lenny2, to be released via the testing-security channel, as
soon as possible.  Other versions of Debian are not affected.

We recommend that you upgrade your clamav packages.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian (stable)
- - ---------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1.orig.tar.gz
    Size/MD5 checksum: 11643310 cd11c05b5476262eaea4fa3bd7dc25bf
  http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2.diff.gz
    Size/MD5 checksum:   202678 b69d5dd04efa34a1b5d754d00d02325a
  http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2.dsc
    Size/MD5 checksum:      886 8ea6dec6430464f80367174cbf1522ee

Architecture independent packages:

  http://security.debian.org/pool/updates/main/c/clamav/clamav-base_0.90.1-3etch2_all.deb
    Size/MD5 checksum:   200024 399e614261bcf6fc11f9d8cb1f31aa36
  http://security.debian.org/pool/updates/main/c/clamav/clamav-docs_0.90.1-3etch2_all.deb
    Size/MD5 checksum:  1005888 07cf61246264a02b5f3f75b712dc352f
  http://security.debian.org/pool/updates/main/c/clamav/clamav-testfiles_0.90.1-3etch2_all.deb
    Size/MD5 checksum:   157450 84cfbe25cbb8f43f84d3e7608dd1ff00

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_alpha.deb
    Size/MD5 checksum:   405598 e89e635ca763a960a2b9641034cffe1f
  http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_alpha.deb
    Size/MD5 checksum:   863126 be2975967f9abcad74ac30ad1a7b4ecc
  http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_alpha.deb
    Size/MD5 checksum:   509806 596fb241736d8336811f5631ef922937
  http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_alpha.deb
    Size/MD5 checksum:   184282 678347363c2723c9562aa7e5edda23fe
  http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_alpha.deb
    Size/MD5 checksum:   643780 d44e46beb7ed21b5f423cc40d93feae9
  http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_alpha.deb
    Size/MD5 checksum:  9303354 954ef0ff1af4fbafdf32d0230edf6d79
  http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_alpha.deb
    Size/MD5 checksum:   179444 d066c1c6f9d1b738abba4150ecfbe3ef

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_amd64.deb
    Size/MD5 checksum:   176536 3b19c1bfabe694d90a047232a3cb21ea
  http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_amd64.deb
    Size/MD5 checksum:   178048 1d2d279449991d196c0444502fd05e7a
  http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_amd64.deb
    Size/MD5 checksum:   637530 8914446075225de9dc8c97dd16b83acd
  http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_amd64.deb
    Size/MD5 checksum:   856120 96322f73a53bc97b115ee7fcbfb3560e
  http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_amd64.deb
    Size/MD5 checksum:   366656 ff2956673dbbb4a62e5ab9153a80a9cf
  http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_amd64.deb
    Size/MD5 checksum:   385832 56bd5d5f8a4b2a1241c109d88d3b4279
  http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_amd64.deb
    Size/MD5 checksum:  9301488 175ff062a9408489ec8c185124e209a4

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_arm.deb
    Size/MD5 checksum:   362196 50bfa1d26925ac85140583fce13b3909
  http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_arm.deb
    Size/MD5 checksum:   173260 8e65843c91e2a1fe5446cb540445556a
  http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_arm.deb
    Size/MD5 checksum:  9299326 4a9c05ea0f08fbca693f1884f116b0f8
  http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_arm.deb
    Size/MD5 checksum:   366018 d07ef427cb65e5839f0b523c08d55c1c
  http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_arm.deb
    Size/MD5 checksum:   174362 74669807f901a4b8a3ce125b3ad333c9
  http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_arm.deb
    Size/MD5 checksum:   596846 c1ac53e1501d73611556ffc547496f3b
  http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_arm.deb
    Size/MD5 checksum:   851644 952a117428093c42dd281b5c695832e0

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_hppa.deb
    Size/MD5 checksum:   176618 89bf2c97a2690eecccebe60e3a7cd55f
  http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_hppa.deb
    Size/MD5 checksum:   404346 22abe6d6d95e7933d38969fabc552253
  http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_hppa.deb
    Size/MD5 checksum:  9302836 78c95396f0971eef4c1b8f73809b74a6
  http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_hppa.deb
    Size/MD5 checksum:   617610 b0b2c5131ae5c8ebbbc049a0a204ffd4
  http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_hppa.deb
    Size/MD5 checksum:   856878 b085a2d8317bce6476d6129df8962e38
  http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_hppa.deb
    Size/MD5 checksum:   177774 0a2a82b14cdcf0cabd566e8ed8c74e9c
  http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_hppa.deb
    Size/MD5 checksum:   432198 c4ad61a24a60b73528db102363af6d00

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_i386.deb
    Size/MD5 checksum:   367872 4a4c2d68de04892779fa2ee18d454af1
  http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_i386.deb
    Size/MD5 checksum:  9299034 a57a8dabcbfdb1ca948c7807e2b161d5
  http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_i386.deb
    Size/MD5 checksum:   173352 1effd13aca20fd86e8b00d1a0a21e842
  http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_i386.deb
    Size/MD5 checksum:   365298 a188cff902e8d3642e376a2185f48209
  http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_i386.deb
    Size/MD5 checksum:   604376 3f2b2b9b7019c4b0ec612acab2de915b
  http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_i386.deb
    Size/MD5 checksum:   174936 ac2c9892b4ba30ecae20c35597b8fcc9
  http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_i386.deb
    Size/MD5 checksum:   854652 8a44c143be20d81e88ac3500ef387df6

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_ia64.deb
    Size/MD5 checksum:  9314878 52935be009b4a84223a81151df5ddbba
  http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_ia64.deb
    Size/MD5 checksum:   474192 c31fc49ca7bdd22488a15b99357b5d76
  http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_ia64.deb
    Size/MD5 checksum:   201282 f1fe669400c25fab7b39c54ef4eaecda
  http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_ia64.deb
    Size/MD5 checksum:   878096 fcdac4ab11700a235d4d39ebdbeb27c5
  http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_ia64.deb
    Size/MD5 checksum:   190928 62d04383c37b80857a93467913a1c14c
  http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_ia64.deb
    Size/MD5 checksum:   656284 de83f9db8dfdf447752093747bd2a2d9
  http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_ia64.deb
    Size/MD5 checksum:   520668 edc7f091eb3cc1186839384bfef06d21

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_mips.deb
    Size/MD5 checksum:   371698 fc79ffd010ad11bfa3160cf6ea3ce707
  http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_mips.deb
    Size/MD5 checksum:   179500 911eb19759eaf1cf427542dae6f28406
  http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_mips.deb
    Size/MD5 checksum:   174912 cf528b98d0097a8eb48f20904c9d2293
  http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_mips.deb
    Size/MD5 checksum:  9301294 c790bf6ecaf6006c91e1cef8a4a77923
  http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_mips.deb
    Size/MD5 checksum:   646430 f5c54dcdcded52b66ff4147fddc71f59
  http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_mips.deb
    Size/MD5 checksum:   854314 305e3bf521ff3f2cd96792922a2c625b
  http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_mips.deb
    Size/MD5 checksum:   434900 6a543233716cd4b768afebbea6b61d6a

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_mipsel.deb
    Size/MD5 checksum:   854248 3ea1e1812a2daa168a9533176fe1e074
  http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_mipsel.deb
    Size/MD5 checksum:   179608 8541d8cbfbe953440b3ef5dfd517b63e
  http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_mipsel.deb
    Size/MD5 checksum:  9301454 7f1090c461b1770d05c8ded4308f1e89
  http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_mipsel.deb
    Size/MD5 checksum:   364882 c8bc7c3b7c605e37af80ebce9eea919a
  http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_mipsel.deb
    Size/MD5 checksum:   426150 401882418c4e16b3e58a99d8b021f8b7
  http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_mipsel.deb
    Size/MD5 checksum:   635298 81f659a808b56347b350ad675e0c29ce
  http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_mipsel.deb
    Size/MD5 checksum:   175152 4440f5cfc45930032d5b7ee149c8ffa8

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_powerpc.deb
    Size/MD5 checksum:   181496 f05c77fa28abd1aafcc376ae4e28c587
  http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_powerpc.deb
    Size/MD5 checksum:   405258 3bd384a4001434b69039dd3bb1437826
  http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_powerpc.deb
    Size/MD5 checksum:   636532 7434d9bb7f4657e77204fa5f708b3421
  http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_powerpc.deb
    Size/MD5 checksum:   856934 13a0e913693e549c7562afbe59ee2cc0
  http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_powerpc.deb
    Size/MD5 checksum:   377756 8a28b60a850123a811317bf1ab752947
  http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_powerpc.deb
    Size/MD5 checksum:  9301808 ff846ca9fe56ce38d25a00ee83cecc2a
  http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_powerpc.deb
    Size/MD5 checksum:   175654 52166fa0e96a3fbed8c47600bd9b6ccb

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_s390.deb
    Size/MD5 checksum:   854876 4eb7c4af3574b496997a79de2c00bd59
  http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_s390.deb
    Size/MD5 checksum:   390766 6f40991adee8e0877e9e0968240fc299
  http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_s390.deb
    Size/MD5 checksum:   176048 ce6514408234d53d0e09e78de7b34b60
  http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_s390.deb
    Size/MD5 checksum:   176232 f26d9e37a2b5b6e2ebc11408c2a1c87e
  http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_s390.deb
    Size/MD5 checksum:   401248 30566a8c06b87fa9226e3ee490ed985f
  http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_s390.deb
    Size/MD5 checksum:   627618 c46d97bd8cf40a85cb8882df6e554913
  http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_s390.deb
    Size/MD5 checksum:  9300662 5a58ee27fad028c3e8e4632426cce41c

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.90.1-3etch2_sparc.deb
    Size/MD5 checksum:  9298416 e3846fca2a382ccc5596d04e9a5ab469
  http://security.debian.org/pool/updates/main/c/clamav/clamav-dbg_0.90.1-3etch2_sparc.deb
    Size/MD5 checksum:   583752 1085766a6eb6e086a745b65c8d65f3cd
  http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.90.1-3etch2_sparc.deb
    Size/MD5 checksum:   171712 0be51d03cf3b023cf6e5899d6b71d798
  http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.90.1-3etch2_sparc.deb
    Size/MD5 checksum:   388500 3cb57fbe22b4fb9d4fad41e9b7d25ed8
  http://security.debian.org/pool/updates/main/c/clamav/libclamav2_0.90.1-3etch2_sparc.deb
    Size/MD5 checksum:   376772 3e724ed0289a2c8d42e6cde9155cb4b3
  http://security.debian.org/pool/updates/main/c/clamav/clamav_0.90.1-3etch2_sparc.deb
    Size/MD5 checksum:   850984 cd8672207fe749f42f909fb135f3ab06
  http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.90.1-3etch2_sparc.deb
    Size/MD5 checksum:   173342 e6a2627dffed9ac3afe3716271d8efb1


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGUcZIYrVLjBFATsMRAp2WAJ9q35hvpPisSMBrSTmKU7U/+ZWSfACfS41Y
SbsLWkL6iDeQL6cneMDL+3k=
=EalO
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRlTciih9+71yA2DNAQKKmgP/TlcyIYSi/H8OD9IGBv4i44iaYjWMZ6Mc
NOqfo+QDuF84674Zul5TG7d/YEoj9lxXNF2DPBVQUt6pUKkQYpbZ/FODkLJ/BTCM
5lM0Uz86lyJle/iQsCC5lY44dILV8nC/+Y3J+4vgwrrDs6NgxHfuTMnI42xMX9Vh
kLFW9osERUc=
=vZBn
-----END PGP SIGNATURE-----