Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-2021 (GCVE-0-2013-2021)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.480Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "53150", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53150" }, { "name": "FEDORA-2013-10853", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html" }, { "name": "FEDORA-2013-8047", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html" }, { "name": "SUSE-SU-2014:1571", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html" }, { "name": "openSUSE-SU-2013:0881", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5892" }, { "name": "USN-1816-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1816-1" }, { "name": "openSUSE-SU-2013:0883", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971" }, { "name": "53182", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53182" }, { "name": "APPLE-SA-2013-09-12-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html" }, { "name": "[oss-security] 20130429 Re: Multiple potential security issues fixed in ClamAV 0.97.8 - any further details?", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/29/20" }, { "name": "APPLE-SA-2013-09-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html" }, { "name": "59434", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/59434" }, { "name": "[oss-security] 20130424 Re: Multiple potential security issues fixed in ClamAV 0.97.8 - any further details?", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/25/2" }, { "name": "MDVSA-2013:159", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:159" }, { "name": "FEDORA-2013-10953", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.clamav.net/show_bug.cgi?id=7053" }, { "name": "FEDORA-2013-10980", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5880" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-12-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "53150", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53150" }, { "name": "FEDORA-2013-10853", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html" }, { "name": "FEDORA-2013-8047", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html" }, { "name": "SUSE-SU-2014:1571", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html" }, { "name": "openSUSE-SU-2013:0881", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5892" }, { "name": "USN-1816-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1816-1" }, { "name": "openSUSE-SU-2013:0883", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971" }, { "name": "53182", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53182" }, { "name": "APPLE-SA-2013-09-12-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html" }, { "name": "[oss-security] 20130429 Re: Multiple potential security issues fixed in ClamAV 0.97.8 - any further details?", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/29/20" }, { "name": "APPLE-SA-2013-09-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html" }, { "name": "59434", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/59434" }, { "name": "[oss-security] 20130424 Re: Multiple potential security issues fixed in ClamAV 0.97.8 - any further details?", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/25/2" }, { "name": "MDVSA-2013:159", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:159" }, { "name": "FEDORA-2013-10953", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.clamav.net/show_bug.cgi?id=7053" }, { "name": "FEDORA-2013-10980", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5880" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2021", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "53150", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53150" }, { "name": "FEDORA-2013-10853", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html" }, { "name": "FEDORA-2013-8047", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html" }, { "name": "SUSE-SU-2014:1571", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html" }, { "name": "openSUSE-SU-2013:0881", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html" }, { "name": "http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html", "refsource": "CONFIRM", "url": "http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html" }, { "name": "http://support.apple.com/kb/HT5892", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5892" }, { "name": "USN-1816-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1816-1" }, { "name": "openSUSE-SU-2013:0883", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html" }, { "name": "https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971", "refsource": "CONFIRM", "url": "https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971" }, { "name": "53182", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53182" }, { "name": "APPLE-SA-2013-09-12-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html" }, { "name": "[oss-security] 20130429 Re: Multiple potential security issues fixed in ClamAV 0.97.8 - any further details?", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2013/04/29/20" }, { "name": "APPLE-SA-2013-09-17-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html" }, { "name": "59434", "refsource": "BID", "url": "http://www.securityfocus.com/bid/59434" }, { "name": "[oss-security] 20130424 Re: Multiple potential security issues fixed in ClamAV 0.97.8 - any further details?", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2013/04/25/2" }, { "name": "MDVSA-2013:159", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:159" }, { "name": "FEDORA-2013-10953", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html" }, { "name": "https://bugzilla.clamav.net/show_bug.cgi?id=7053", "refsource": "CONFIRM", "url": "https://bugzilla.clamav.net/show_bug.cgi?id=7053" }, { "name": "FEDORA-2013-10980", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html" }, { "name": "http://support.apple.com/kb/HT5880", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5880" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2021", "datePublished": "2013-05-13T23:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:37.480Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-2021\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-05-13T23:55:02.277\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file.\"},{\"lang\":\"es\",\"value\":\"pdf.c en ClamAV v0.97.1 hasta v0.97.7 ermite a atacantes remotos provocar una denegaci\u00f3n de servicio (lectura fuera de limite) a trav\u00e9s de la modificaci\u00f3n de longitud en un fichero PDF cifrado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*\",\"matchCriteriaId\":\"7118F616-25CA-4E34-AA13-4D14BB62419F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4174F4F-149E-41A6-BBCC-D01114C05F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*\",\"matchCriteriaId\":\"F5D324C4-97C7-49D3-A809-9EAD4B690C69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2076871-2E80-4605-A470-A41C1A8EC7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFAA48D9-BEB4-4E49-AD50-325C262D46D9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"71A5DC34-0211-4CCC-BBF1-8A8EB759BACB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B607D3E-C3E0-41C5-B8A1-4A5CD0BD3FAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clamav:clamav:0.97.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A8D5471-BED3-4411-83B8-DBBC8A67A3D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clamav:clamav:0.97.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"290AE73B-C2E9-43B7-8D28-9EE22BFF66C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clamav:clamav:0.97.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F0A5703-477B-4967-85D5-D479681C547F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clamav:clamav:0.97.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96C838E8-2798-4E00-BF63-642E99648630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clamav:clamav:0.97.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C0E6887-2440-457F-B27B-53A3823E940F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clamav:clamav:0.97.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ECCD536-4323-4DFC-B662-C83F40690C50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clamav:clamav:0.97.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FFD6F5B-D70E-4B9C-9D83-BBF34DD5AD57\"}]}]}],\"references\":[{\"url\":\"http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/53150\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/53182\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5880\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT5892\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:159\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2013/04/25/2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2013/04/29/20\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/59434\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1816-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.clamav.net/show_bug.cgi?id=7053\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/53150\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/53182\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5880\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT5892\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:159\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2013/04/25/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2013/04/29/20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/59434\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1816-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.clamav.net/show_bug.cgi?id=7053\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorImpact\":\"Per http://www.ubuntu.com/usn/USN-1816-1/\\n\\\"A security issue affects these releases of Ubuntu and its derivatives:\\n\\n Ubuntu 13.04\\n Ubuntu 12.10\\n Ubuntu 12.04 LTS\\n Ubuntu 11.10\\n Ubuntu 10.04 LTS\\\"\"}}" } }
ghsa-8rc2-m544-5vqh
Vulnerability from github
pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file.
{ "affected": [], "aliases": [ "CVE-2013-2021" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-05-13T23:55:00Z", "severity": "MODERATE" }, "details": "pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file.", "id": "GHSA-8rc2-m544-5vqh", "modified": "2022-05-17T04:06:50Z", "published": "2022-05-17T04:06:50Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2021" }, { "type": "WEB", "url": "https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971" }, { "type": "WEB", "url": "https://bugzilla.clamav.net/show_bug.cgi?id=7053" }, { "type": "WEB", "url": "http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/53150" }, { "type": "WEB", "url": "http://secunia.com/advisories/53182" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5880" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5892" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:159" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2013/04/25/2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2013/04/29/20" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/59434" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1816-1" } ], "schema_version": "1.4.0", "severity": [] }
suse-su-2015:0298-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Recommended update for clamav", "title": "Title of the patch" }, { "category": "description", "text": "\nThe antivirus scanner ClamAV has been updated to version 0.98.3, which \nincludes the following fixes and enhancements:\n\n * Support for common raw disk image formats using 512 byte sectors,\n specifically GPT, APM, and MBR partitioning.\n * All ClamAV sockets (clamd, freshclam, clamav-milter, clamdscan,\n clamdtop) now support IPV6 addresses and configuration parameters.\n * Use OpenSSL file hash functions for improved performance.\n * Improved detection of malware scripts within image files.\n * Miscellaneous bug fixes and documentation improvements.\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sledsp3-clamav,slessp1-clamav,slessp2-clamav,slessp3-clamav", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0298-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0298-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150298-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0298-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-February/001230.html" }, { "category": "self", "summary": "SUSE Bug 816865", "url": "https://bugzilla.suse.com/816865" }, { "category": "self", "summary": "SUSE Bug 841815", "url": "https://bugzilla.suse.com/841815" }, { "category": "self", "summary": "SUSE Bug 865883", "url": "https://bugzilla.suse.com/865883" }, { "category": "self", "summary": "SUSE Bug 877475", "url": "https://bugzilla.suse.com/877475" }, { "category": "self", "summary": "SUSE Bug 903489", "url": "https://bugzilla.suse.com/903489" }, { "category": "self", "summary": "SUSE Bug 903719", "url": "https://bugzilla.suse.com/903719" }, { "category": "self", "summary": "SUSE Bug 904207", "url": "https://bugzilla.suse.com/904207" }, { "category": "self", "summary": "SUSE Bug 906077", "url": "https://bugzilla.suse.com/906077" }, { "category": "self", "summary": "SUSE Bug 906770", "url": "https://bugzilla.suse.com/906770" }, { "category": "self", "summary": "SUSE Bug 915512", "url": "https://bugzilla.suse.com/915512" }, { "category": "self", "summary": "SUSE Bug 916214", "url": "https://bugzilla.suse.com/916214" }, { "category": "self", "summary": "SUSE Bug 916215", "url": "https://bugzilla.suse.com/916215" }, { "category": "self", "summary": "SUSE Bug 916217", "url": "https://bugzilla.suse.com/916217" }, { "category": "self", "summary": "SUSE Bug 929192", "url": "https://bugzilla.suse.com/929192" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2020 page", "url": "https://www.suse.com/security/cve/CVE-2013-2020/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2021 page", "url": "https://www.suse.com/security/cve/CVE-2013-2021/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6497 page", "url": "https://www.suse.com/security/cve/CVE-2013-6497/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9050 page", "url": "https://www.suse.com/security/cve/CVE-2014-9050/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9328 page", "url": "https://www.suse.com/security/cve/CVE-2014-9328/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1461 page", "url": "https://www.suse.com/security/cve/CVE-2015-1461/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1462 page", "url": "https://www.suse.com/security/cve/CVE-2015-1462/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1463 page", "url": "https://www.suse.com/security/cve/CVE-2015-1463/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2170 page", "url": "https://www.suse.com/security/cve/CVE-2015-2170/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2221 page", "url": "https://www.suse.com/security/cve/CVE-2015-2221/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2222 page", "url": "https://www.suse.com/security/cve/CVE-2015-2222/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2305 page", "url": "https://www.suse.com/security/cve/CVE-2015-2305/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2668 page", "url": "https://www.suse.com/security/cve/CVE-2015-2668/" } ], "title": "Recommended update for clamav", "tracking": { "current_release_date": "2014-05-28T15:49:37Z", "generator": { "date": "2014-05-28T15:49:37Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0298-1", "initial_release_date": "2014-05-28T15:49:37Z", "revision_history": [ { "date": "2014-05-28T15:49:37Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "clamav-0.98.3-0.11.1.i586", "product": { "name": "clamav-0.98.3-0.11.1.i586", "product_id": "clamav-0.98.3-0.11.1.i586" } }, { "category": "product_version", "name": "clamav-0.97.8-0.2.1.i586", "product": { "name": "clamav-0.97.8-0.2.1.i586", "product_id": "clamav-0.97.8-0.2.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "clamav-0.97.8-0.2.1.ia64", "product": { "name": "clamav-0.97.8-0.2.1.ia64", "product_id": "clamav-0.97.8-0.2.1.ia64" } }, { "category": "product_version", "name": "clamav-0.98.3-0.11.1.ia64", "product": { "name": "clamav-0.98.3-0.11.1.ia64", "product_id": "clamav-0.98.3-0.11.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "clamav-0.97.8-0.2.1.ppc64", "product": { "name": "clamav-0.97.8-0.2.1.ppc64", "product_id": "clamav-0.97.8-0.2.1.ppc64" } }, { "category": "product_version", "name": "clamav-0.98.3-0.11.1.ppc64", "product": { "name": "clamav-0.98.3-0.11.1.ppc64", "product_id": "clamav-0.98.3-0.11.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "clamav-0.98.3-0.11.1.s390x", "product": { "name": "clamav-0.98.3-0.11.1.s390x", "product_id": "clamav-0.98.3-0.11.1.s390x" } }, { "category": "product_version", "name": "clamav-0.97.8-0.2.1.s390x", "product": { "name": "clamav-0.97.8-0.2.1.s390x", "product_id": "clamav-0.97.8-0.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "clamav-0.98.3-0.11.1.x86_64", "product": { "name": "clamav-0.98.3-0.11.1.x86_64", "product_id": "clamav-0.98.3-0.11.1.x86_64" } }, { "category": "product_version", "name": "clamav-0.97.8-0.2.1.x86_64", "product": { "name": "clamav-0.97.8-0.2.1.x86_64", "product_id": "clamav-0.97.8-0.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp1:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2", "product": { "name": "SUSE Linux Enterprise Server 11 SP2", "product_id": "SUSE Linux Enterprise Server 11 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586" }, "product_reference": "clamav-0.98.3-0.11.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64" }, "product_reference": "clamav-0.98.3-0.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586" }, "product_reference": "clamav-0.98.3-0.11.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.s390x as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x" }, "product_reference": "clamav-0.98.3-0.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64" }, "product_reference": "clamav-0.98.3-0.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586" }, "product_reference": "clamav-0.98.3-0.11.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.s390x as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x" }, "product_reference": "clamav-0.98.3-0.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64" }, "product_reference": "clamav-0.98.3-0.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP1-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.97.8-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP2", "product_id": "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586" }, "product_reference": "clamav-0.97.8-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.97.8-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP2", "product_id": "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64" }, "product_reference": "clamav-0.97.8-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.97.8-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP2", "product_id": "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64" }, "product_reference": "clamav-0.97.8-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.97.8-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP2", "product_id": "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x" }, "product_reference": "clamav-0.97.8-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.97.8-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2", "product_id": "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64" }, "product_reference": "clamav-0.97.8-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.97.8-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586" }, "product_reference": "clamav-0.97.8-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.97.8-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64" }, "product_reference": "clamav-0.97.8-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.97.8-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64" }, "product_reference": "clamav-0.97.8-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.97.8-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x" }, "product_reference": "clamav-0.97.8-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.97.8-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64" }, "product_reference": "clamav-0.97.8-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.97.8-0.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586" }, "product_reference": "clamav-0.97.8-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.97.8-0.2.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64" }, "product_reference": "clamav-0.97.8-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.97.8-0.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64" }, "product_reference": "clamav-0.97.8-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.97.8-0.2.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x" }, "product_reference": "clamav-0.97.8-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.97.8-0.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64" }, "product_reference": "clamav-0.97.8-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586" }, "product_reference": "clamav-0.98.3-0.11.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64" }, "product_reference": "clamav-0.98.3-0.11.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64" }, "product_reference": "clamav-0.98.3-0.11.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x" }, "product_reference": "clamav-0.98.3-0.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64" }, "product_reference": "clamav-0.98.3-0.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586" }, "product_reference": "clamav-0.98.3-0.11.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64" }, "product_reference": "clamav-0.98.3-0.11.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64" }, "product_reference": "clamav-0.98.3-0.11.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x" }, "product_reference": "clamav-0.98.3-0.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64" }, "product_reference": "clamav-0.98.3-0.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586" }, "product_reference": "clamav-0.98.3-0.11.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64" }, "product_reference": "clamav-0.98.3-0.11.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64" }, "product_reference": "clamav-0.98.3-0.11.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x" }, "product_reference": "clamav-0.98.3-0.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" }, "product_reference": "clamav-0.98.3-0.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2020" } ], "notes": [ { "category": "general", "text": "Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2020", "url": "https://www.suse.com/security/cve/CVE-2013-2020" }, { "category": "external", "summary": "SUSE Bug 816865 for CVE-2013-2020", "url": "https://bugzilla.suse.com/816865" }, { "category": "external", "summary": "SUSE Bug 899395 for CVE-2013-2020", "url": "https://bugzilla.suse.com/899395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2013-2020" }, { "cve": "CVE-2013-2021", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2021" } ], "notes": [ { "category": "general", "text": "pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2021", "url": "https://www.suse.com/security/cve/CVE-2013-2021" }, { "category": "external", "summary": "SUSE Bug 816865 for CVE-2013-2021", "url": "https://bugzilla.suse.com/816865" }, { "category": "external", "summary": "SUSE Bug 899395 for CVE-2013-2021", "url": "https://bugzilla.suse.com/899395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2013-2021" }, { "cve": "CVE-2013-6497", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6497" } ], "notes": [ { "category": "general", "text": "clamscan in ClamAV before 0.98.5, when using -a option, allows remote attackers to cause a denial of service (crash) as demonstrated by the jwplayer.js file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6497", "url": "https://www.suse.com/security/cve/CVE-2013-6497" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2013-6497", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 906077 for CVE-2013-6497", "url": "https://bugzilla.suse.com/906077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2013-6497" }, { "cve": "CVE-2014-9050", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9050" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the cli_scanpe function in libclamav/pe.c in ClamAV before 0.98.5 allows remote attackers to cause a denial of service (crash) via a crafted y0da Crypter PE file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9050", "url": "https://www.suse.com/security/cve/CVE-2014-9050" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2014-9050", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 906770 for CVE-2014-9050", "url": "https://bugzilla.suse.com/906770" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2014-9050" }, { "cve": "CVE-2014-9328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9328" } ], "notes": [ { "category": "general", "text": "ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upack packer file, related to a \"heap out of bounds condition.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9328", "url": "https://www.suse.com/security/cve/CVE-2014-9328" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2014-9328", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 915512 for CVE-2014-9328", "url": "https://bugzilla.suse.com/915512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "important" } ], "title": "CVE-2014-9328" }, { "cve": "CVE-2015-1461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1461" } ], "notes": [ { "category": "general", "text": "ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted (1) Yoda\u0027s crypter or (2) mew packer file, related to a \"heap out of bounds condition.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1461", "url": "https://www.suse.com/security/cve/CVE-2015-1461" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-1461", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 916217 for CVE-2015-1461", "url": "https://bugzilla.suse.com/916217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "important" } ], "title": "CVE-2015-1461" }, { "cve": "CVE-2015-1462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1462" } ], "notes": [ { "category": "general", "text": "ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upx packer file, related to a \"heap out of bounds condition.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1462", "url": "https://www.suse.com/security/cve/CVE-2015-1462" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-1462", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 916214 for CVE-2015-1462", "url": "https://bugzilla.suse.com/916214" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "important" } ], "title": "CVE-2015-1462" }, { "cve": "CVE-2015-1463", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1463" } ], "notes": [ { "category": "general", "text": "ClamAV before 0.98.6 allows remote attackers to cause a denial of service (crash) via a crafted petite packer file, related to an \"incorrect compiler optimization.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1463", "url": "https://www.suse.com/security/cve/CVE-2015-1463" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-1463", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 916215 for CVE-2015-1463", "url": "https://bugzilla.suse.com/916215" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2015-1463" }, { "cve": "CVE-2015-2170", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2170" } ], "notes": [ { "category": "general", "text": "The upx decoder in ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2170", "url": "https://www.suse.com/security/cve/CVE-2015-2170" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-2170", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 921950 for CVE-2015-2170", "url": "https://bugzilla.suse.com/921950" }, { "category": "external", "summary": "SUSE Bug 922560 for CVE-2015-2170", "url": "https://bugzilla.suse.com/922560" }, { "category": "external", "summary": "SUSE Bug 929192 for CVE-2015-2170", "url": "https://bugzilla.suse.com/929192" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2015-2170" }, { "cve": "CVE-2015-2221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2221" } ], "notes": [ { "category": "general", "text": "ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted y0da cryptor file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2221", "url": "https://www.suse.com/security/cve/CVE-2015-2221" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-2221", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 921950 for CVE-2015-2221", "url": "https://bugzilla.suse.com/921950" }, { "category": "external", "summary": "SUSE Bug 922560 for CVE-2015-2221", "url": "https://bugzilla.suse.com/922560" }, { "category": "external", "summary": "SUSE Bug 929192 for CVE-2015-2221", "url": "https://bugzilla.suse.com/929192" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2015-2221" }, { "cve": "CVE-2015-2222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2222" } ], "notes": [ { "category": "general", "text": "ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted petite packed file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2222", "url": "https://www.suse.com/security/cve/CVE-2015-2222" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-2222", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 921950 for CVE-2015-2222", "url": "https://bugzilla.suse.com/921950" }, { "category": "external", "summary": "SUSE Bug 922560 for CVE-2015-2222", "url": "https://bugzilla.suse.com/922560" }, { "category": "external", "summary": "SUSE Bug 929192 for CVE-2015-2222", "url": "https://bugzilla.suse.com/929192" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2015-2222" }, { "cve": "CVE-2015-2305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2305" } ], "notes": [ { "category": "general", "text": "Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2305", "url": "https://www.suse.com/security/cve/CVE-2015-2305" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-2305", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 921950 for CVE-2015-2305", "url": "https://bugzilla.suse.com/921950" }, { "category": "external", "summary": "SUSE Bug 922022 for CVE-2015-2305", "url": "https://bugzilla.suse.com/922022" }, { "category": "external", "summary": "SUSE Bug 922028 for CVE-2015-2305", "url": "https://bugzilla.suse.com/922028" }, { "category": "external", "summary": "SUSE Bug 922030 for CVE-2015-2305", "url": "https://bugzilla.suse.com/922030" }, { "category": "external", "summary": "SUSE Bug 922043 for CVE-2015-2305", "url": "https://bugzilla.suse.com/922043" }, { "category": "external", "summary": "SUSE Bug 922560 for CVE-2015-2305", "url": "https://bugzilla.suse.com/922560" }, { "category": "external", "summary": "SUSE Bug 922567 for CVE-2015-2305", "url": "https://bugzilla.suse.com/922567" }, { "category": "external", "summary": "SUSE Bug 929192 for CVE-2015-2305", "url": "https://bugzilla.suse.com/929192" }, { "category": "external", "summary": "SUSE Bug 980366 for CVE-2015-2305", "url": "https://bugzilla.suse.com/980366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2015-2305" }, { "cve": "CVE-2015-2668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2668" } ], "notes": [ { "category": "general", "text": "ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted xz archive file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2668", "url": "https://www.suse.com/security/cve/CVE-2015-2668" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-2668", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 921950 for CVE-2015-2668", "url": "https://bugzilla.suse.com/921950" }, { "category": "external", "summary": "SUSE Bug 922560 for CVE-2015-2668", "url": "https://bugzilla.suse.com/922560" }, { "category": "external", "summary": "SUSE Bug 929192 for CVE-2015-2668", "url": "https://bugzilla.suse.com/929192" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-LTSS:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP1-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP2:clamav-0.97.8-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2015-2668" } ] }
suse-su-2015:0871-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Recommended update for clamav", "title": "Title of the patch" }, { "category": "description", "text": "\nThe antivirus scanner ClamAV has been updated to version 0.98.3, which \nincludes the following fixes and enhancements:\n\n * Support for common raw disk image formats using 512 byte sectors,\n specifically GPT, APM, and MBR partitioning.\n * All ClamAV sockets (clamd, freshclam, clamav-milter, clamdscan,\n clamdtop) now support IPV6 addresses and configuration parameters.\n * Use OpenSSL file hash functions for improved performance.\n * Improved detection of malware scripts within image files.\n * Miscellaneous bug fixes and documentation improvements.\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sledsp3-clamav,slessp3-clamav", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0871-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0871-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150871-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0871-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" }, { "category": "self", "summary": "SUSE Bug 816865", "url": "https://bugzilla.suse.com/816865" }, { "category": "self", "summary": "SUSE Bug 841815", "url": "https://bugzilla.suse.com/841815" }, { "category": "self", "summary": "SUSE Bug 865883", "url": "https://bugzilla.suse.com/865883" }, { "category": "self", "summary": "SUSE Bug 877475", "url": "https://bugzilla.suse.com/877475" }, { "category": "self", "summary": "SUSE Bug 903489", "url": "https://bugzilla.suse.com/903489" }, { "category": "self", "summary": "SUSE Bug 903719", "url": "https://bugzilla.suse.com/903719" }, { "category": "self", "summary": "SUSE Bug 904207", "url": "https://bugzilla.suse.com/904207" }, { "category": "self", "summary": "SUSE Bug 906077", "url": "https://bugzilla.suse.com/906077" }, { "category": "self", "summary": "SUSE Bug 906770", "url": "https://bugzilla.suse.com/906770" }, { "category": "self", "summary": "SUSE Bug 915512", "url": "https://bugzilla.suse.com/915512" }, { "category": "self", "summary": "SUSE Bug 916214", "url": "https://bugzilla.suse.com/916214" }, { "category": "self", "summary": "SUSE Bug 916215", "url": "https://bugzilla.suse.com/916215" }, { "category": "self", "summary": "SUSE Bug 916217", "url": "https://bugzilla.suse.com/916217" }, { "category": "self", "summary": "SUSE Bug 929192", "url": "https://bugzilla.suse.com/929192" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2020 page", "url": "https://www.suse.com/security/cve/CVE-2013-2020/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2021 page", "url": "https://www.suse.com/security/cve/CVE-2013-2021/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6497 page", "url": "https://www.suse.com/security/cve/CVE-2013-6497/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9050 page", "url": "https://www.suse.com/security/cve/CVE-2014-9050/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9328 page", "url": "https://www.suse.com/security/cve/CVE-2014-9328/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1461 page", "url": "https://www.suse.com/security/cve/CVE-2015-1461/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1462 page", "url": "https://www.suse.com/security/cve/CVE-2015-1462/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1463 page", "url": "https://www.suse.com/security/cve/CVE-2015-1463/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2170 page", "url": "https://www.suse.com/security/cve/CVE-2015-2170/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2221 page", "url": "https://www.suse.com/security/cve/CVE-2015-2221/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2222 page", "url": "https://www.suse.com/security/cve/CVE-2015-2222/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2305 page", "url": "https://www.suse.com/security/cve/CVE-2015-2305/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2668 page", "url": "https://www.suse.com/security/cve/CVE-2015-2668/" } ], "title": "Recommended update for clamav", "tracking": { "current_release_date": "2014-05-28T15:49:37Z", "generator": { "date": "2014-05-28T15:49:37Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0871-1", "initial_release_date": "2014-05-28T15:49:37Z", "revision_history": [ { "date": "2014-05-28T15:49:37Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "clamav-0.98.3-0.11.1.i586", "product": { "name": "clamav-0.98.3-0.11.1.i586", "product_id": "clamav-0.98.3-0.11.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "clamav-0.98.3-0.11.1.ia64", "product": { "name": "clamav-0.98.3-0.11.1.ia64", "product_id": "clamav-0.98.3-0.11.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "clamav-0.98.3-0.11.1.ppc64", "product": { "name": "clamav-0.98.3-0.11.1.ppc64", "product_id": "clamav-0.98.3-0.11.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "clamav-0.98.3-0.11.1.s390x", "product": { "name": "clamav-0.98.3-0.11.1.s390x", "product_id": "clamav-0.98.3-0.11.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "clamav-0.98.3-0.11.1.x86_64", "product": { "name": "clamav-0.98.3-0.11.1.x86_64", "product_id": "clamav-0.98.3-0.11.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586" }, "product_reference": "clamav-0.98.3-0.11.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64" }, "product_reference": "clamav-0.98.3-0.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586" }, "product_reference": "clamav-0.98.3-0.11.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64" }, "product_reference": "clamav-0.98.3-0.11.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64" }, "product_reference": "clamav-0.98.3-0.11.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x" }, "product_reference": "clamav-0.98.3-0.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64" }, "product_reference": "clamav-0.98.3-0.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586" }, "product_reference": "clamav-0.98.3-0.11.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64" }, "product_reference": "clamav-0.98.3-0.11.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64" }, "product_reference": "clamav-0.98.3-0.11.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x" }, "product_reference": "clamav-0.98.3-0.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64" }, "product_reference": "clamav-0.98.3-0.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586" }, "product_reference": "clamav-0.98.3-0.11.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64" }, "product_reference": "clamav-0.98.3-0.11.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64" }, "product_reference": "clamav-0.98.3-0.11.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x" }, "product_reference": "clamav-0.98.3-0.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "clamav-0.98.3-0.11.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" }, "product_reference": "clamav-0.98.3-0.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2020" } ], "notes": [ { "category": "general", "text": "Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2020", "url": "https://www.suse.com/security/cve/CVE-2013-2020" }, { "category": "external", "summary": "SUSE Bug 816865 for CVE-2013-2020", "url": "https://bugzilla.suse.com/816865" }, { "category": "external", "summary": "SUSE Bug 899395 for CVE-2013-2020", "url": "https://bugzilla.suse.com/899395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2013-2020" }, { "cve": "CVE-2013-2021", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2021" } ], "notes": [ { "category": "general", "text": "pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2021", "url": "https://www.suse.com/security/cve/CVE-2013-2021" }, { "category": "external", "summary": "SUSE Bug 816865 for CVE-2013-2021", "url": "https://bugzilla.suse.com/816865" }, { "category": "external", "summary": "SUSE Bug 899395 for CVE-2013-2021", "url": "https://bugzilla.suse.com/899395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2013-2021" }, { "cve": "CVE-2013-6497", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6497" } ], "notes": [ { "category": "general", "text": "clamscan in ClamAV before 0.98.5, when using -a option, allows remote attackers to cause a denial of service (crash) as demonstrated by the jwplayer.js file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6497", "url": "https://www.suse.com/security/cve/CVE-2013-6497" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2013-6497", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 906077 for CVE-2013-6497", "url": "https://bugzilla.suse.com/906077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2013-6497" }, { "cve": "CVE-2014-9050", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9050" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the cli_scanpe function in libclamav/pe.c in ClamAV before 0.98.5 allows remote attackers to cause a denial of service (crash) via a crafted y0da Crypter PE file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9050", "url": "https://www.suse.com/security/cve/CVE-2014-9050" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2014-9050", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 906770 for CVE-2014-9050", "url": "https://bugzilla.suse.com/906770" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2014-9050" }, { "cve": "CVE-2014-9328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9328" } ], "notes": [ { "category": "general", "text": "ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upack packer file, related to a \"heap out of bounds condition.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9328", "url": "https://www.suse.com/security/cve/CVE-2014-9328" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2014-9328", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 915512 for CVE-2014-9328", "url": "https://bugzilla.suse.com/915512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "important" } ], "title": "CVE-2014-9328" }, { "cve": "CVE-2015-1461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1461" } ], "notes": [ { "category": "general", "text": "ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted (1) Yoda\u0027s crypter or (2) mew packer file, related to a \"heap out of bounds condition.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1461", "url": "https://www.suse.com/security/cve/CVE-2015-1461" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-1461", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 916217 for CVE-2015-1461", "url": "https://bugzilla.suse.com/916217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "important" } ], "title": "CVE-2015-1461" }, { "cve": "CVE-2015-1462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1462" } ], "notes": [ { "category": "general", "text": "ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upx packer file, related to a \"heap out of bounds condition.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1462", "url": "https://www.suse.com/security/cve/CVE-2015-1462" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-1462", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 916214 for CVE-2015-1462", "url": "https://bugzilla.suse.com/916214" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "important" } ], "title": "CVE-2015-1462" }, { "cve": "CVE-2015-1463", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1463" } ], "notes": [ { "category": "general", "text": "ClamAV before 0.98.6 allows remote attackers to cause a denial of service (crash) via a crafted petite packer file, related to an \"incorrect compiler optimization.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1463", "url": "https://www.suse.com/security/cve/CVE-2015-1463" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-1463", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 916215 for CVE-2015-1463", "url": "https://bugzilla.suse.com/916215" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2015-1463" }, { "cve": "CVE-2015-2170", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2170" } ], "notes": [ { "category": "general", "text": "The upx decoder in ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2170", "url": "https://www.suse.com/security/cve/CVE-2015-2170" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-2170", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 921950 for CVE-2015-2170", "url": "https://bugzilla.suse.com/921950" }, { "category": "external", "summary": "SUSE Bug 922560 for CVE-2015-2170", "url": "https://bugzilla.suse.com/922560" }, { "category": "external", "summary": "SUSE Bug 929192 for CVE-2015-2170", "url": "https://bugzilla.suse.com/929192" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2015-2170" }, { "cve": "CVE-2015-2221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2221" } ], "notes": [ { "category": "general", "text": "ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted y0da cryptor file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2221", "url": "https://www.suse.com/security/cve/CVE-2015-2221" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-2221", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 921950 for CVE-2015-2221", "url": "https://bugzilla.suse.com/921950" }, { "category": "external", "summary": "SUSE Bug 922560 for CVE-2015-2221", "url": "https://bugzilla.suse.com/922560" }, { "category": "external", "summary": "SUSE Bug 929192 for CVE-2015-2221", "url": "https://bugzilla.suse.com/929192" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2015-2221" }, { "cve": "CVE-2015-2222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2222" } ], "notes": [ { "category": "general", "text": "ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted petite packed file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2222", "url": "https://www.suse.com/security/cve/CVE-2015-2222" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-2222", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 921950 for CVE-2015-2222", "url": "https://bugzilla.suse.com/921950" }, { "category": "external", "summary": "SUSE Bug 922560 for CVE-2015-2222", "url": "https://bugzilla.suse.com/922560" }, { "category": "external", "summary": "SUSE Bug 929192 for CVE-2015-2222", "url": "https://bugzilla.suse.com/929192" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2015-2222" }, { "cve": "CVE-2015-2305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2305" } ], "notes": [ { "category": "general", "text": "Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2305", "url": "https://www.suse.com/security/cve/CVE-2015-2305" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-2305", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 921950 for CVE-2015-2305", "url": "https://bugzilla.suse.com/921950" }, { "category": "external", "summary": "SUSE Bug 922022 for CVE-2015-2305", "url": "https://bugzilla.suse.com/922022" }, { "category": "external", "summary": "SUSE Bug 922028 for CVE-2015-2305", "url": "https://bugzilla.suse.com/922028" }, { "category": "external", "summary": "SUSE Bug 922030 for CVE-2015-2305", "url": "https://bugzilla.suse.com/922030" }, { "category": "external", "summary": "SUSE Bug 922043 for CVE-2015-2305", "url": "https://bugzilla.suse.com/922043" }, { "category": "external", "summary": "SUSE Bug 922560 for CVE-2015-2305", "url": "https://bugzilla.suse.com/922560" }, { "category": "external", "summary": "SUSE Bug 922567 for CVE-2015-2305", "url": "https://bugzilla.suse.com/922567" }, { "category": "external", "summary": "SUSE Bug 929192 for CVE-2015-2305", "url": "https://bugzilla.suse.com/929192" }, { "category": "external", "summary": "SUSE Bug 980366 for CVE-2015-2305", "url": "https://bugzilla.suse.com/980366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2015-2305" }, { "cve": "CVE-2015-2668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2668" } ], "notes": [ { "category": "general", "text": "ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted xz archive file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2668", "url": "https://www.suse.com/security/cve/CVE-2015-2668" }, { "category": "external", "summary": "SUSE Bug 1040662 for CVE-2015-2668", "url": "https://bugzilla.suse.com/1040662" }, { "category": "external", "summary": "SUSE Bug 921950 for CVE-2015-2668", "url": "https://bugzilla.suse.com/921950" }, { "category": "external", "summary": "SUSE Bug 922560 for CVE-2015-2668", "url": "https://bugzilla.suse.com/922560" }, { "category": "external", "summary": "SUSE Bug 929192 for CVE-2015-2668", "url": "https://bugzilla.suse.com/929192" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server 11 SP3:clamav-0.98.3-0.11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:clamav-0.98.3-0.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-05-28T15:49:37Z", "details": "moderate" } ], "title": "CVE-2015-2668" } ] }
CERTA-2013-AVI-532
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Apple OS X Server. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Apple OS X Server versions antérieures à 2.2.2
Vendor | Product | Description |
---|
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003cP\u003eApple OS X Server versions ant\u00e9rieures \u00e0 2.2.2\u003c/P\u003e", "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2013-1899", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1899" }, { "name": "CVE-2013-1901", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1901" }, { "name": "CVE-2013-2021", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2021" }, { "name": "CVE-2013-2020", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2020" }, { "name": "CVE-2013-1900", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1900" }, { "name": "CVE-2013-1034", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1034" } ], "initial_release_date": "2013-09-18T00:00:00", "last_revision_date": "2013-09-18T00:00:00", "links": [], "reference": "CERTA-2013-AVI-532", "revisions": [ { "description": "version initiale.", "revision_date": "2013-09-18T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Injection de code indirecte \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple OS X Server\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple OS X Server", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple du 17 septembre 2013", "url": "http://support.apple.com/kb/HT5892" } ] }
CERTA-2013-AVI-529
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Apple OS X Mountain Lion. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Apple OS X Mountain Lion versions antérieures à 10.8.5
Vendor | Product | Description |
---|
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003cP\u003eApple OS X Mountain Lion versions ant\u00e9rieures \u00e0 10.8.5\u003c/P\u003e", "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2012-5166", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5166" }, { "name": "CVE-2013-1027", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1027" }, { "name": "CVE-2012-4244", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4244" }, { "name": "CVE-2013-1635", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1635" }, { "name": "CVE-2013-1029", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1029" }, { "name": "CVE-2013-1899", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1899" }, { "name": "CVE-2013-1901", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1901" }, { "name": "CVE-2013-1032", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1032" }, { "name": "CVE-2012-2687", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2687" }, { "name": "CVE-2013-1643", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1643" }, { "name": "CVE-2013-1031", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1031" }, { "name": "CVE-2012-5688", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5688" }, { "name": "CVE-2013-0166", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0166" }, { "name": "CVE-2013-1033", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1033" }, { "name": "CVE-2012-2686", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2686" }, { "name": "CVE-2012-3817", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3817" }, { "name": "CVE-2013-2021", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2021" }, { "name": "CVE-2013-0169", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0169" }, { "name": "CVE-2012-4558", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4558" }, { "name": "CVE-2013-1025", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1025" }, { "name": "CVE-2013-1028", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1028" }, { "name": "CVE-2013-1903", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1903" }, { "name": "CVE-2013-2020", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2020" }, { "name": "CVE-2012-3499", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3499" }, { "name": "CVE-2013-1900", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1900" }, { "name": "CVE-2013-1824", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1824" }, { "name": "CVE-2013-2110", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2110" }, { "name": "CVE-2013-2266", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2266" }, { "name": "CVE-2013-1026", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1026" }, { "name": "CVE-2013-1902", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1902" }, { "name": "CVE-2012-0883", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0883" }, { "name": "CVE-2013-1030", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1030" } ], "initial_release_date": "2013-09-13T00:00:00", "last_revision_date": "2013-09-13T00:00:00", "links": [], "reference": "CERTA-2013-AVI-529", "revisions": [ { "description": "version initiale.", "revision_date": "2013-09-13T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple OS X Mountain Lion\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple OS X Mountain Lion", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple du 12 septembre 2013", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html" } ] }
fkie_cve-2013-2021
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
secalert@redhat.com | http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html | ||
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html | ||
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html | ||
secalert@redhat.com | http://secunia.com/advisories/53150 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/53182 | Vendor Advisory | |
secalert@redhat.com | http://support.apple.com/kb/HT5880 | ||
secalert@redhat.com | http://support.apple.com/kb/HT5892 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2013:159 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2013/04/25/2 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2013/04/29/20 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/59434 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-1816-1 | ||
secalert@redhat.com | https://bugzilla.clamav.net/show_bug.cgi?id=7053 | ||
secalert@redhat.com | https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/53150 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/53182 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5880 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5892 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2013:159 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2013/04/25/2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2013/04/29/20 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/59434 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1816-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.clamav.net/show_bug.cgi?id=7053 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971 |
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 11.10 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 12.10 | |
canonical | ubuntu_linux | 13.04 | |
suse | linux_enterprise_server | 11.0 | |
suse | linux_enterprise_server | 11.0 | |
clamav | clamav | 0.97.1 | |
clamav | clamav | 0.97.2 | |
clamav | clamav | 0.97.3 | |
clamav | clamav | 0.97.4 | |
clamav | clamav | 0.97.5 | |
clamav | clamav | 0.97.6 | |
clamav | clamav | 0.97.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "71A5DC34-0211-4CCC-BBF1-8A8EB759BACB", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "7B607D3E-C3E0-41C5-B8A1-4A5CD0BD3FAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clamav:clamav:0.97.1:*:*:*:*:*:*:*", "matchCriteriaId": "2A8D5471-BED3-4411-83B8-DBBC8A67A3D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:clamav:clamav:0.97.2:*:*:*:*:*:*:*", "matchCriteriaId": "290AE73B-C2E9-43B7-8D28-9EE22BFF66C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:clamav:clamav:0.97.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A5703-477B-4967-85D5-D479681C547F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clamav:clamav:0.97.4:*:*:*:*:*:*:*", "matchCriteriaId": "96C838E8-2798-4E00-BF63-642E99648630", "vulnerable": true }, { "criteria": "cpe:2.3:a:clamav:clamav:0.97.5:*:*:*:*:*:*:*", "matchCriteriaId": "2C0E6887-2440-457F-B27B-53A3823E940F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clamav:clamav:0.97.6:*:*:*:*:*:*:*", "matchCriteriaId": "6ECCD536-4323-4DFC-B662-C83F40690C50", "vulnerable": true }, { "criteria": "cpe:2.3:a:clamav:clamav:0.97.7:*:*:*:*:*:*:*", "matchCriteriaId": "3FFD6F5B-D70E-4B9C-9D83-BBF34DD5AD57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file." }, { "lang": "es", "value": "pdf.c en ClamAV v0.97.1 hasta v0.97.7 ermite a atacantes remotos provocar una denegaci\u00f3n de servicio (lectura fuera de limite) a trav\u00e9s de la modificaci\u00f3n de longitud en un fichero PDF cifrado." } ], "evaluatorImpact": "Per http://www.ubuntu.com/usn/USN-1816-1/\n\"A security issue affects these releases of Ubuntu and its derivatives:\n\n Ubuntu 13.04\n Ubuntu 12.10\n Ubuntu 12.04 LTS\n Ubuntu 11.10\n Ubuntu 10.04 LTS\"", "id": "CVE-2013-2021", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-05-13T23:55:02.277", "references": [ { "source": "secalert@redhat.com", "url": "http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53150" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53182" }, { "source": "secalert@redhat.com", "url": "http://support.apple.com/kb/HT5880" }, { "source": "secalert@redhat.com", "url": "http://support.apple.com/kb/HT5892" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:159" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2013/04/25/2" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2013/04/29/20" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/59434" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1816-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.clamav.net/show_bug.cgi?id=7053" }, { "source": "secalert@redhat.com", "url": "https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT5880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT5892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/04/25/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/04/29/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/59434" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1816-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.clamav.net/show_bug.cgi?id=7053" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2013-2021
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2013-2021", "description": "pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file.", "id": "GSD-2013-2021", "references": [ "https://www.suse.com/security/cve/CVE-2013-2021.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2013-2021" ], "details": "pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file.", "id": "GSD-2013-2021", "modified": "2023-12-13T01:22:18.128822Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2021", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "53150", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53150" }, { "name": "FEDORA-2013-10853", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html" }, { "name": "FEDORA-2013-8047", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html" }, { "name": "SUSE-SU-2014:1571", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html" }, { "name": "openSUSE-SU-2013:0881", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html" }, { "name": "http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html", "refsource": "CONFIRM", "url": "http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html" }, { "name": "http://support.apple.com/kb/HT5892", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5892" }, { "name": "USN-1816-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1816-1" }, { "name": "openSUSE-SU-2013:0883", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html" }, { "name": "https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971", "refsource": "CONFIRM", "url": "https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971" }, { "name": "53182", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53182" }, { "name": "APPLE-SA-2013-09-12-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html" }, { "name": "[oss-security] 20130429 Re: Multiple potential security issues fixed in ClamAV 0.97.8 - any further details?", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2013/04/29/20" }, { "name": "APPLE-SA-2013-09-17-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html" }, { "name": "59434", "refsource": "BID", "url": "http://www.securityfocus.com/bid/59434" }, { "name": "[oss-security] 20130424 Re: Multiple potential security issues fixed in ClamAV 0.97.8 - any further details?", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2013/04/25/2" }, { "name": "MDVSA-2013:159", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:159" }, { "name": "FEDORA-2013-10953", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html" }, { "name": "https://bugzilla.clamav.net/show_bug.cgi?id=7053", "refsource": "CONFIRM", "url": "https://bugzilla.clamav.net/show_bug.cgi?id=7053" }, { "name": "FEDORA-2013-10980", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html" }, { "name": "http://support.apple.com/kb/HT5880", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5880" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:clamav:clamav:0.97.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:clamav:clamav:0.97.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:clamav:clamav:0.97.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:clamav:clamav:0.97.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:clamav:clamav:0.97.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:clamav:clamav:0.97.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:clamav:clamav:0.97.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2021" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "59434", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/59434" }, { "name": "https://bugzilla.clamav.net/show_bug.cgi?id=7053", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.clamav.net/show_bug.cgi?id=7053" }, { "name": "MDVSA-2013:159", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:159" }, { "name": "USN-1816-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-1816-1" }, { "name": "https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971", "refsource": "CONFIRM", "tags": [], "url": "https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971" }, { "name": "[oss-security] 20130424 Re: Multiple potential security issues fixed in ClamAV 0.97.8 - any further details?", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2013/04/25/2" }, { "name": "53150", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53150" }, { "name": "53182", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/53182" }, { "name": "[oss-security] 20130429 Re: Multiple potential security issues fixed in ClamAV 0.97.8 - any further details?", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2013/04/29/20" }, { "name": "http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html", "refsource": "CONFIRM", "tags": [], "url": "http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html" }, { "name": "openSUSE-SU-2013:0883", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html" }, { "name": "openSUSE-SU-2013:0881", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html" }, { "name": "FEDORA-2013-10853", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html" }, { "name": "FEDORA-2013-10953", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html" }, { "name": "FEDORA-2013-10980", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html" }, { "name": "APPLE-SA-2013-09-12-1", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html" }, { "name": "http://support.apple.com/kb/HT5880", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT5880" }, { "name": "APPLE-SA-2013-09-17-1", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html" }, { "name": "http://support.apple.com/kb/HT5892", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT5892" }, { "name": "FEDORA-2013-8047", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html" }, { "name": "SUSE-SU-2014:1571", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2015-09-28T16:33Z", "publishedDate": "2013-05-13T23:55Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.