ClamAV update patches two vulnerabilities

By

ClamAV users are urged to upgrade to the latest version to correct two vulnerabilities that could crash the free, open-source anti-virus toolkit and lead to an attacker hijacking infected systems.


ClamAV is a popular toolkit for Unix-like operating systems and is mainly deployed to secure email exchange servers.
According to the SANS Internet Storm Center, the more serious of two bugs is related to the handling of PE (portable executable) file format. The other vulnerability is caused by a memory access error in CHM, the file extension for compressed HTML help files, according to Secunia, which has labeled both flaws "highly critical."
For attackers to exploit the two bugs, they must send "specially constructed executable files through a mail gateway or personal anti-virus client utilizing the ClamAV scanning engine."
Users who upgrade to version 0.88.5 should avoid problems. William Salusky, a SANS handler, said in a blog post Monday that alternatively, users could download release candidate v0.90RC1 from the ClamAV site.
 Click here to email Dan Kaplan.
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Phishing attack nets enormous npm supply chain compromise

Phishing attack nets enormous npm supply chain compromise

"VoidProxy" PhishKit targets Google and Microsoft users

"VoidProxy" PhishKit targets Google and Microsoft users

Apple adds "mercenary spyware" protection to new A19 chip

Apple adds "mercenary spyware" protection to new A19 chip

VicRoads to phase out passwords in favour of passkeys

VicRoads to phase out passwords in favour of passkeys

Log In

  |  Forgot your password?