-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1363
                    [DLA 1759-1] clamav security update
                               23 April 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           clamav
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Access Privileged Data          -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-1789 CVE-2019-1788 CVE-2019-1787

Reference:         ESB-2019.1211
                   ESB-2019.1183
                   ESB-2019.1170
                   ESB-2019.1137

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2019/04/msg00019.html

- --------------------------BEGIN INCLUDED TEXT--------------------

Package        : clamav
Version        : 0.100.3+dfsg-0+deb8u1
CVE ID         : CVE-2019-1787 CVE-2019-1788 CVE-2019-1789
Debian Bug     :


Out-of-bounds read and write conditions have been fixed in clamav.

CVE-2019-1787

    An out-of-bounds heap read condition may occur when scanning PDF
    documents. The defect is a failure to correctly keep track of the number
    of bytes remaining in a buffer when indexing file data.

CVE-2019-1788

    An out-of-bounds heap write condition may occur when scanning OLE2 files
    such as Microsoft Office 97-2003 documents. The invalid write happens when
    an invalid pointer is mistakenly used to initialize a 32bit integer to
    zero. This is likely to crash the application.

CVE-2019-1789

    An out-of-bounds heap read condition may occur when scanning PE files
    (i.e. Windows EXE and DLL files) that have been packed using Aspack as a
    result of inadequate bound-checking.


For Debian 8 "Jessie", these problems have been fixed in version
0.100.3+dfsg-0+deb8u1.

We recommend that you upgrade your clamav packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ocIg
-----END PGP SIGNATURE-----