{"affected":[{"ecosystem_specific":{"binaries":[{"clamav":"0.99.3-33.5.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 6","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20OpenStack%20Cloud%206"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.3-33.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.3-33.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP2","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.3-33.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.3-33.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP3","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.3-33.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.3-33.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.3-33.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.3-33.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.3-33.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.3-33.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.3-33.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.3-33.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12-LTSS","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.3-33.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.3-33.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP1-LTSS","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.3-33.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.3-33.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.3-33.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.3-33.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.3-33.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.3-33.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.3-33.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.3-33.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.3-33.5.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for clamav fixes the following issues:\n\n- Update to security release 0.99.3 (bsc#1077732)\n  * CVE-2017-12376 (ClamAV Buffer Overflow in handle_pdfname Vulnerability)\n  * CVE-2017-12377 (ClamAV Mew Packet Heap Overflow Vulnerability)\n  * CVE-2017-12379 (ClamAV Buffer Overflow in messageAddArgument Vulnerability)\n    - these vulnerabilities could have allowed an unauthenticated,\n      remote attacker to cause a denial of service (DoS) condition\n      or potentially execute arbitrary code on an affected device.\n  * CVE-2017-12374 (ClamAV use-after-free Vulnerabilities)\n  * CVE-2017-12375 (ClamAV Buffer Overflow Vulnerability)\n  * CVE-2017-12378 (ClamAV Buffer Over Read Vulnerability)\n  * CVE-2017-12380 (ClamAV Null Dereference Vulnerability)\n    - these vulnerabilities could have allowed an unauthenticated,\n      remote attacker to cause a denial of service (DoS) condition on an affected device.\n  * CVE-2017-6420 (bsc#1052448)\n    - this vulnerability could have allowed remote attackers to cause a denial of service\n      (use-after-free) via a crafted PE file with WWPack compression.\n  * CVE-2017-6419 (bsc#1052449)\n    - ClamAV could have allowed remote attackers to cause a denial of service\n      (heap-based buffer overflow and application crash) or possibly\n      have unspecified other impact via a crafted CHM file.\n  * CVE-2017-11423 (bsc#1049423)\n    - ClamAV could have allowed remote attackers to cause a denial of service\n      (stack-based buffer over-read and application crash) via a crafted CAB file.\n  * CVE-2017-6418 (bsc#1052466)\n    - ClamAV could have allowed remote attackers to cause a denial\n      of service (out-of-bounds read) via a crafted e-mail message.\n- update upstream keys in the keyring\n\n- provide and obsolete clamav-nodb to trigger it's removal in Leap\n  bsc#1040662\n","id":"SUSE-SU-2018:0255-1","modified":"2018-01-27T16:17:45Z","published":"2018-01-27T16:17:45Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20180255-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1040662"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049423"},{"type":"REPORT","url":"https://bugzilla.suse.com/1052448"},{"type":"REPORT","url":"https://bugzilla.suse.com/1052449"},{"type":"REPORT","url":"https://bugzilla.suse.com/1052466"},{"type":"REPORT","url":"https://bugzilla.suse.com/1077732"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-11423"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12374"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12375"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12376"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12377"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12378"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12379"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12380"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-6418"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-6419"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-6420"}],"related":["CVE-2017-11423","CVE-2017-12374","CVE-2017-12375","CVE-2017-12376","CVE-2017-12377","CVE-2017-12378","CVE-2017-12379","CVE-2017-12380","CVE-2017-6418","CVE-2017-6419","CVE-2017-6420"],"summary":"Security update for clamav","upstream":["CVE-2017-11423","CVE-2017-12374","CVE-2017-12375","CVE-2017-12376","CVE-2017-12377","CVE-2017-12378","CVE-2017-12379","CVE-2017-12380","CVE-2017-6418","CVE-2017-6419","CVE-2017-6420"]}