Page 3 of 10 FirstFirst 1234567 ... LastLast
Results 21 to 30 of 95

Thread: Multiple AV vendor vulns - archived

  1. #21
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation

    FYI...

    ClamAV multiple vulns - update available
    - http://secunia.com/advisories/28907/
    Release Date: 2008-02-12
    Last Update: 2008-02-13
    Critical: Highly critical
    Impact: DoS, System access
    Where: From remote
    Solution Status: Vendor Patch
    Software: Clam AntiVirus (clamav) 0.x
    ...The vulnerabilities are reported in versions prior to 0.92.1.
    Solution: Update to version 0.92.1...
    Original Advisory:
    http://sourceforge.net/project/shown...ease_id=575703 ...

    - http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6595

    - http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0318

    - http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0728

    Last edited by AplusWebMaster; 2008-02-19 at 15:34.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  2. #22
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation F-Secure vuln - hotfix available

    FYI...

    F-Secure vuln - hotfix available
    - http://www.f-secure.com/security/fsc-2008-1.shtml
    Last updated: 2008-02-19 ...
    Risk Factor: High
    The gateway passes archives unscanned
    Mitigating Factors:
    * Exploitation of these vulnerabilities requires specially crafted archives
    * The CAB issue has been fixed automatically in F-Secure database updates, while fixing the RAR archive scanning requires installing the hotfix..."

    (More detail at the URL above.)

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  3. #23
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation

    FYI...

    Symantec RAR File vulns - updates available
    - http://secunia.com/advisories/29140/
    Release Date: 2008-02-27
    Critical: Highly critical
    Impact: DoS, System access
    Where: From remote
    Solution Status: Vendor Patch
    Software: Symantec AntiVirus for Network Attached Storage 4.x
    Symantec AntiVirus Scan Engine 4.x
    Symantec AntiVirus/Filtering for Domino 3.x
    Symantec Mail Security for Exchange 4.x
    Symantec Mail Security for Microsoft Exchange 5.x
    Symantec Scan Engine 5.x...
    Original Advisory: SYM08-006:
    http://www.symantec.com/avcenter/sec...008.02.27.html ...
    "...to ensure all available updates have been applied, users can manually launch and run LiveUpdate..."
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  4. #24
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Post

    FYI...

    Panda vuln - updates available
    - http://secunia.com/advisories/29311/
    Release Date: 2008-03-10
    Critical: Less critical
    Impact: Privilege escalation, DoS
    Where: Local system
    Solution Status: Vendor Patch
    Software: Panda Antivirus + Firewall 2008, Panda Internet Security 2008 ...
    Solution: Apply hotfix.
    Panda Internet Security 2008 (hfp120801s1.exe):
    http://www.pandasecurity.com/resourc...fp120801s1.exe
    Panda Antivirus + Firewall 2008 (hft70801s1.exe):
    http://www.pandasecurity.com/resourc...hft70801s1.exe ...
    Original Advisory: Panda:
    http://www.pandasecurity.com/homeuse...=2&ref=ProdExp
    http://www.pandasecurity.com/homeuse...=2&ref=ProdExp ...

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  5. #25
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation F-Secure Security Advisory FSC-2008-2

    FYI...

    F-Secure Security Advisory FSC-2008-2
    - http://www.f-secure.com/weblog/archives/00001404.html
    March 17, 2008 - "...The Secure Programming Group at Oulu University has created a collection of malformed archive files. These archive files break and crash products from at least 40 vendors - including several antivirus vendors...including us. We've fixed a long list of our products to resolve these issues. Home users will get these fixes via the normal update system and they don't have to do anything... Our guidance here is the same as for patches from any other vendor: Patch now before someone figures out how to exploit the vulnerability. At the moment we are not aware of any public exploit methods for these vulnerabilities. For more information, please consult F-Secure Security Advisory FSC-2008-2* and CERT-FI and CPNI Joint Vulnerability Advisory on Archive Formats**."
    * http://www.f-secure.com/security/fsc-2008-2.shtml
    (Hotfixes/patches available)

    ** https://www.cert.fi/haavoittuvuudet/...e-formats.html
    17 March 2008 - "...The vulnerabilities described in this advisory can potentially affect programs that handle the archive formats ACE, ARJ, BZ2, CAB, GZ, LHA, RAR, TAR, ZIP and ZOO. The Test Suite contains a set of fuzzed archive files in different formats, some of which may cause and some that are known to cause problems in common tools processing archived content..."

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  6. #26
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation

    FYI...

    CA Alert Notification Server service vuln - updates available
    - https://support.ca.com/irj/portal/an...ntentID=173103
    Issued: April 3rd, 2008 - "CA's customer support is alerting customers to security risks in products that use the Alert Notification Server service. Multiple vulnerabilities exist that can allow a remote authenticated attacker to execute arbitrary code or cause a denial of service condition. CA has issued updates to address the vulnerabilities.
    The vulnerabilities, CVE-2007-4620, are due to insufficient bounds checking in multiple procedures. A remote authenticated attacker or local user can exploit a buffer overflow to execute arbitrary code or cause a denial of service.
    Risk Rating: High
    Affected Products:
    CA Anti-Virus for the Enterprise 7.1
    CA Threat Manager for the Enterprise (formerly eTrust Integrated Threat Management) r8
    CA Threat Manager for the Enterprise (formerly eTrust Integrated Threat Management) r8.1
    CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) r8
    CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) r8.1
    BrightStor ARCserve Backup r11.5
    BrightStor ARCserve Backup r11.1
    BrightStor ARCserve Backup r11 for Windows
    Solution: CA has provided updates to address the vulnerabilities... (links at URL above)
    Workaround: None..."

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  7. #27
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation

    FYI...

    ClamAV vuln
    - http://secunia.com/advisories/29000/
    Release Date: 2008-04-14
    Critical: Highly critical
    Impact: System access
    Where: From remote
    Solution Status: Vendor Workaround
    Software: Clam AntiVirus (clamav) 0.x
    ...The vulnerability is confirmed in versions 0.92 and 0.92.1. Prior versions may also be affected.
    Solution: An updated version should be available shortly. The PE scanning module has been remotely switched off after 10/03/2008.

    Do not scan untrusted PE files...

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  8. #28
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation

    FYI...

    ClamAV multiple vulns - update available
    - http://secunia.com/advisories/29000/
    Last Update: 2008-04-15
    Critical: Highly critical
    Impact: DoS, System access
    Where: From remote
    Solution Status: Vendor Patch
    Software: Clam AntiVirus (clamav) 0.x
    ...The vulnerabilities are reported in version 0.92.1. Prior versions may also be affected.
    Solution: Update to version 0.93.
    Download:
    - http://www.clamav.net/download/sources
    Changelog:
    - http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog

    http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1100

    http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1387

    Last edited by AplusWebMaster; 2008-04-17 at 21:51.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  9. #29
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation

    FYI...

    ClamAV vuln - update available
    - http://secunia.com/advisories/30657/
    Release Date: 2008-06-17
    Critical: Moderately critical
    Impact: DoS
    Where: From remote
    Solution Status: Vendor Patch
    Software: Clam AntiVirus (clamav) 0.x...
    The vulnerability is reported in versions prior to 0.93.1.
    Solution: Update to version 0.93.1.
    Original Advisory:
    https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1000 ...

    Download:
    http://sourceforge.net/project/showf...group_id=86638

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  10. #30
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation

    Backtrack...

    - http://atlas.arbor.net/briefs/index#-51119944
    Severity: High Severity
    Published: Friday, June 20, 2008 20:31

    ClamAV vuln... now marked as "Unpatched"
    - http://secunia.com/advisories/30657/
    Last Update: 2008-06-20
    Critical: Moderately critical
    Impact: DoS
    Where: From remote
    Solution Status: Unpatched ...
    The vulnerability is confirmed in versions 0.93 and 0.93.1. Other versions may also be affected.
    Solution: Disable the scanning of PE files.
    NOTE: Version 0.93.1 only fixes a particular exploitation vector...
    Changelog:
    2008-06-20: Updated "Solution" section and marked the advisory as unpatched...

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •