Package: havp
Version: 0.88-1.1
Severity: normal

http://www.securityfocus.com/bid/31051/info

ClamAV Multiple Unspecified Memory Corruption Vulnerabilities:

ClamAV is prone to multiple unspecified memory-corruption
vulnerabilities.

Attackers may be able to exploit these issues to exhaust resources or
possibly crash the affected application, denying service to legitimate
users. Attackers may also be able to obtain sensitive information and
run arbitrary code.

Versions prior to ClamAV 0.94 are vulnerable. 

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (650, 'stable'), (500, 'testing')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-6-amd64
Locale: LANG=en_US, LC_CTYPE=en_US.utf8 (charmap=UTF-8) (ignored: LC_ALL set to 
en_US.utf8)

Versions of packages havp depends on:
ii  adduser            3.102                 Add and remove users and groups
ii  debconf [debconf-2 1.5.11etch2           Debian configuration management sy
ii  libc6              2.7-13                GNU C Library: Shared libraries
ii  libclamav4         0.93.3.dfsg-volatile1 anti-virus utility for Unix - libr
ii  libgcc1            1:4.1.1-21            GCC support library
ii  libstdc++6         4.3.1-9               The GNU Standard C++ Library v3

Versions of packages havp recommends:
ii  clamav-freshclam   0.94.dfsg-1~volatile1 anti-virus utility for Unix - viru

-- debconf information excluded



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to