<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for clamav</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:1210-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-04-16T08:28:16Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-04-16T08:28:16Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-04-16T08:28:16Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for clamav</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-1210</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:1210-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1130721</URL>
      <Description>SUSE Bug 1130721</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1787/</URL>
      <Description>SUSE CVE CVE-2019-1787 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1788/</URL>
      <Description>SUSE CVE CVE-2019-1788 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1789/</URL>
      <Description>SUSE CVE CVE-2019-1789 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="clamav-0.100.3-lp150.2.10.1">
      <FullProductName ProductID="clamav-0.100.3-lp150.2.10.1">clamav-0.100.3-lp150.2.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="clamav-devel-0.100.3-lp150.2.10.1">
      <FullProductName ProductID="clamav-devel-0.100.3-lp150.2.10.1">clamav-devel-0.100.3-lp150.2.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libclamav7-0.100.3-lp150.2.10.1">
      <FullProductName ProductID="libclamav7-0.100.3-lp150.2.10.1">libclamav7-0.100.3-lp150.2.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libclammspack0-0.100.3-lp150.2.10.1">
      <FullProductName ProductID="libclammspack0-0.100.3-lp150.2.10.1">libclammspack0-0.100.3-lp150.2.10.1</FullProductName>
    </Branch>
    <Relationship ProductReference="clamav-0.100.3-lp150.2.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:clamav-0.100.3-lp150.2.10.1">clamav-0.100.3-lp150.2.10.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="clamav-devel-0.100.3-lp150.2.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:clamav-devel-0.100.3-lp150.2.10.1">clamav-devel-0.100.3-lp150.2.10.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libclamav7-0.100.3-lp150.2.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libclamav7-0.100.3-lp150.2.10.1">libclamav7-0.100.3-lp150.2.10.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libclammspack0-0.100.3-lp150.2.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libclammspack0-0.100.3-lp150.2.10.1">libclammspack0-0.100.3-lp150.2.10.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.</Note>
    </Notes>
    <CVE>CVE-2019-1787</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:clamav-0.100.3-lp150.2.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:clamav-devel-0.100.3-lp150.2.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libclamav7-0.100.3-lp150.2.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libclammspack0-0.100.3-lp150.2.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1787.html</URL>
        <Description>CVE-2019-1787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130721</URL>
        <Description>SUSE Bug 1130721</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the Object Linking &amp; Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.</Note>
    </Notes>
    <CVE>CVE-2019-1788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:clamav-0.100.3-lp150.2.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:clamav-devel-0.100.3-lp150.2.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libclamav7-0.100.3-lp150.2.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libclammspack0-0.100.3-lp150.2.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1788.html</URL>
        <Description>CVE-2019-1788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130721</URL>
        <Description>SUSE Bug 1130721</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.</Note>
    </Notes>
    <CVE>CVE-2019-1789</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:clamav-0.100.3-lp150.2.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:clamav-devel-0.100.3-lp150.2.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libclamav7-0.100.3-lp150.2.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libclammspack0-0.100.3-lp150.2.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1789.html</URL>
        <Description>CVE-2019-1789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130721</URL>
        <Description>SUSE Bug 1130721</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
