-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT External Security Bulletin Redistribution
ClamAV 0.101.4 released with new vulnerability and complete
fix for previous vulnerability
26 August 2019
AusCERT Security Bulletin Summary
Operating System: UNIX variants (UNIX, Linux, OSX)
Impact/Access: Denial of Service -- Remote/Unauthenticated
CVE Names: CVE-2019-12900 CVE-2019-12625
- --------------------------BEGIN INCLUDED TEXT--------------------
Wednesday, August 21, 2019
ClamAV 0.101.4 security patch release has been published
Today we have published the ClamAV 0.101.4 security patch release.
ClamAV 0.101.4 is a security patch release that addresses the following issues.
* An out of bounds write was possible within ClamAV's NSIS bzip2 library
when attempting decompression in cases where the number of selectors
exceeded the max limit set by the library (CVE-2019-12900). The issue has
been resolved by respecting that limit.
Thanks to Martin Simmons for reporting the issue here.
* The zip bomb vulnerability mitigated in 0.101.3 has been assigned the CVE
identifier CVE-2019-12625. Unfortunately, a workaround for the zip-bomb
mitigation was immediately identified. To remediate the zip-bomb scan time
issue, a scan time limit has been introduced in 0.101.4. This limit now
resolves ClamAV's vulnerability to CVE-2019-12625.
The default scan time limit is 2 minutes (120000 milliseconds).
To customize the time limit:
- use the clamscan --max-scantime option
- use the clamd MaxScanTime config option
Libclamav users may customize the time limit using the cl_engine_set_num
function. For example:
Thanks to David Fifield for reviewing the zip-bomb mitigation in 0.101.3
and reporting the issue.
As usual, ClamAV may be downloaded from https://www.clamav.net/downloads, and
discussion should take place on the ClamAV-Users list. Thanks!
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to email@example.com
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
Australian Computer Emergency Response Team
The University of Queensland
Internet Email: firstname.lastname@example.org
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----