On Monday 31 December 2007 8:07 am, Sarocet wrote:
> Chris wrote:
> > Saw this link at SANS today, anything to it?
> >
> > http://seclists.org/fulldisclosure/2007/Dec/0625.html
> >
> > Or is this a rehash of something already known about
>
> I'm not a clam developer, but here's my view about them:
>
> It lists three "vulnerabilities"
> 1- cli_gentempfd is  vulnerable to a race condition attack.
> It's a bug. O_EXCL needs to be added to libclamav/others.c line 847. Not
> fixed yet on  trunk.
> Attacker needs a local account.
>
> I'm attaching a patch for it, so you can patch and rebuild your version.
>
> 2- ClamAV fails to properly check for base64-UUEncoded files, allowing
> bypassing of the scanner through the use of such files.
>
> Not really a bug. Having ClamAV check those files would be an *enhacement*.
>
> 3- Sigtool utility overwrites files when utf16-decoding.
> I'm not sure that it's a vulnerability. It's run by the user, which
> could be willing to overwrite it.
> Adding an "overwriting file" warning would be a good idea, but denying
> to write an existing file
> could break some scripts (and if you were to add an overwrite flag the
> "danger" is exactly the same as now).
> Only dangerous if you have sigtool suid.

Thanks, I'm not running a server here, just use ClamAV here on my home desktop 
in with Spamassassin, basically as a tool to catch and report spam and 
virus's to the offending ISP's, etc..

Chris

-- 
Chris
KeyID 0xE372A7DA98E6705C

Attachment: pgpTGAWtMWajq.pgp
Description: PGP signature

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html

Reply via email to