Package: havp Version: 0.88-1.1 Severity: normal http://www.securityfocus.com/bid/31051/info
ClamAV Multiple Unspecified Memory Corruption Vulnerabilities: ClamAV is prone to multiple unspecified memory-corruption vulnerabilities. Attackers may be able to exploit these issues to exhaust resources or possibly crash the affected application, denying service to legitimate users. Attackers may also be able to obtain sensitive information and run arbitrary code. Versions prior to ClamAV 0.94 are vulnerable. -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (650, 'stable'), (500, 'testing') Architecture: amd64 (x86_64) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-6-amd64 Locale: LANG=en_US, LC_CTYPE=en_US.utf8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.utf8) Versions of packages havp depends on: ii adduser 3.102 Add and remove users and groups ii debconf [debconf-2 1.5.11etch2 Debian configuration management sy ii libc6 2.7-13 GNU C Library: Shared libraries ii libclamav4 0.93.3.dfsg-volatile1 anti-virus utility for Unix - libr ii libgcc1 1:4.1.1-21 GCC support library ii libstdc++6 4.3.1-9 The GNU Standard C++ Library v3 Versions of packages havp recommends: ii clamav-freshclam 0.94.dfsg-1~volatile1 anti-virus utility for Unix - viru -- debconf information excluded -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]