IT-Connect

Übersicht Übersicht Suchen Suchen Ebene Ebene
Kategorie: Clamav v2
Seite 1 von 3
Anzahl Unterkategorien: 1
Sortiert nach:
Standard | Name | Autor | Datum | Downloads
folder_blue.png Clamav v2 Dateien: 10

 

Copfilter forum http://www.copfilter.org/forum/

Copfilter wiki http://www.copfilter.org/wiki/

 

 

ClamAV

Copfilter clamav update packages

 

  • untar the package (tar xzvf <package_name.tar.gz>)
  • change to the folder (cd <package_name>)
  • type ./install

 

 

 

 

Please do not install this updates on IPCop Version 1.4.x!

 

ClamAV Website: http://www.clamav.net

 

 

Unterkategorien:
folder_blue.png Clamav Mods v2 Dateien: 6

Here you can find clamav modifications


Install Instruction


  • untar the package (tar xzvf <package_name.tar.gz>)
  • change to the folder (cd <package_name>)
  • type ./install


 

German Wiki: http://www.copfilter.org/wiki/doku.php?id=de:modifikationen_mods_-_erweiterungen#rd_party_signaturen



 
Dateien:
zip.png clamav_0.100.2_copfilter-v2_bundle.tar.gz

Download

 

Clamav 0.100.1 for Copfilter v2 (with new c_icap 0.5.5 and c_icap-modules 0.5.2)

 

  • Fixes for the following ClamAV vulnerabilities:
    • CVE-2018-15378:
      • Vulnerability in ClamAV's MEW unpacking feature that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
      • Reported by Secunia Research at Flexera.
    • Fix for a 2-byte buffer over-read bug in ClamAV's PDF parsing code.
      • Reported by Alex Gaynor.
    • Fixes for the following vulnerabilities in bundled third-party libraries:
    • CVE-2018-14680:
      • An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.
    • CVE-2018-14681:
      • An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.
    • CVE-2018-14682:
      • An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression. Additionally, 0.100.2 reverted 0.100.1's patch for CVE-2018-14679, and applied libmspack's version of the fix in its place
  • Other changes:
    • Some users have reported freshclam signature update failures as a result of a delay between the time the new signature database content is announced and the time that the content-delivery-network has the content available for download. To mitigate these errors, this patch release includes some modifications to freshclam to make it more lenient, and to reduce the time that freshclam will ignore a mirror when it detects an issue.
    • On-Access "Extra Scanning", an opt-in minor feature of OnAccess scanning on Linux systems, has been disabled due to a known issue with resource cleanup OnAccessExtraScanning will be re-enabled in a future release when the issue is resolved. In the mean-time, users who enabled the feature in clamd.conf will see a warning informing them that the feature is not active. For details, see: https://bugzilla.clamav.net/show_bug.cgi?id=12048

 

md5sum:  060361274721908a1cf4546666c4148b
sha1sum: 0fbf25e55a4862eefcb5054d371f72cd2564821b

 



Erstelldatum
Dateigröße
Downloads
08.10.2018 20:10:56
6.6 MB
75
zip.png clamav_0.100.1_copfilter-v2.tar.gz 0.100.1

Download

 

Clamav 0.100.1 for Copfilter v2 (for having the newest version of c-icap, you have to install previous update 0.99.3!)

 

md5sum:  742d5ff1a213d65723dd80d5320e2679
sha1sum: 2752a43bb8be21d91c6f6e1918e7fdc1d499e9f7

 

 

 

 



Erstelldatum
Dateigröße
Downloads
23.08.2018 15:02:06
5.12 MB
112
zip.png clamav_0.100.0_copfilter-v2.tar.gz

Download

 

Clamav 0.100.0 for Copfilter v2 (for having the newest version of c-icap, you have to install previous update 0.99.3!)

 

md5sum:  14db65f352575534646e133d6044d487
sha1sum: 8579d17a76520507065bb15df6ccad22cf20b982

 

from Mailinglist:

 

ClamAV 0.100.0 is a feature release (candidate) which includes many code submissions from the ClamAV community.

  *    Interfaces to the Prelude SIEM open source package for collecting ClamAV virus events.
  *    Support for Visual Studio 2015 for Windows builds.
  *    Support libmspack internal code or as a shared object library. The internal library is the default and contains additional integrity checks.
  *    Linking with openssl 1.1.0.
  *    Deprecation of the AllowSupplementaryGroups parameter statement in clamd, clamav-milter, and freshclam. Use of supplementary is now in effect by default.
  *    Numerous bug fixes, typo corrections, and compiler warning fixes.


Additionally, we have introduced important changes and new features in ClamAV 0.100, including but not limited to:



  *   Deprecating internal LLVM code support. The configure script has changed to search the system for an installed instance of the LLVM development libraries, and to otherwise use the bytecode interpreter for ClamAV bytecode signatures. To use the LLVM Just-In-Time compiler for executing bytecode signatures, please ensure that the LLVM development package at version 3.6 or lower is installed. Using the deprecated LLVM code is possible with the command: `./configure --with-system-llvm=no`, but it no longer compiles on all platforms.
  *    Compute and check PE import table hash (a.k.a. "imphash") signatures.
  *    Support file property collection and analysis for MHTML files.
  *    Raw scanning of PostScript files.
  *    Fix clamsubmit to use the new virus and false positive submission web interface.
  *    Optionally, flag files with the virus "Heuristic.Limits.Exceeded" when size limitations are exceeded.
  *    Improved decoders for PDF files.
  *    Reduced number of compile time warnings.
  *    Improved support for C++11.
  *    Improved detection of system installed libraries.
  *    Fixes to ClamAV's Container system and the introduction of Intermediates for more descriptive signatures.
  *    Improvements to clamd's On-Access scanning capabilities for Linux.

 

 



Erstelldatum
Dateigröße
Downloads
20.04.2018 18:49:33
5.12 MB
175
zip.png clamav_0.99.4_copfilter-v2.tar.gz

Download

Clamav 0.99.4 for Copfilter v2 (for having the newest version of c-icap, you have to install previous update 0.99.3!)

 

md5sum:  6756c5e761a159902170beefcaaa317f
sha1sum: 001784ee6e724f87240cd3742f925756632e6ac9

 

0.99.4 Release Notes

0.99.4 is a security patch release, quick on the heels of the 0.99.3 security patch release.  This is a renewal of our commitment to the ClamAV community for timely fixes to critical issues.

0.99.4 addresses a few outstanding vulnerability bugs.  It includes fixes for:


  *   CVE-2012-6706<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6706>
  *   CVE-2017-6419<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6419>
  *   CVE-2017-11423<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11423>
  *   CVE-2018-1000085<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000085>

There are also a few bug fixes that were not assigned CVE’s, but were important enough to address while we had the chance.  One of these was the notorious file descriptor exhaustion bug that caused outages late last January.

In addition to the above, 0.99.4 fixes:


  *   CVE-2018-0202<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0202>
     *   Two newly reported vulnerabilities in the PDF parsing code.
  *   GCC 6, C++11 compatibility issues.

 



Erstelldatum
Dateigröße
Downloads
03.03.2018 17:22:00
5 MB
188
tgz.png clamav_0.99.3-bundle_copfilter-v2 0.99.3

Download

Clamav 0.99.3 for Copfilter v2 (with c-icap 0.5.3 / c-icap modules 0.5.1 and havp 0.92a)

 

md5sum:  5bc70d2e797a6cda79a5def88260bc69
sha1sum: 9241929a350ee8b5ea0f04c1128b10c78506ef00

 

Security Update:

CVE-2017-12374
1. ClamAV UAF (use-after-free) Vulnerabilities

The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations. If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition.

CVE-2017-12375
2. ClamAV Buffer Overflow Vulnerability

The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device.

CVE-2017-12376
3. ClamAV Buffer Overflow in handle_pdfname Vulnerability

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device.

The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause a buffer overflow when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code.

CVE-2017-12377
4. ClamAV Mew Packet Heap Overflow Vulnerability

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device.

The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap overflow condition when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device.

CVE-2017-12378
5. ClamAV Buffer Over Read Vulnerability

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device.

CVE-2017-12379
6. ClamAV Buffer Overflow in messageAddArgument Vulnerability

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device.

The vulnerability is due to improper input validation checking mechanisms in the message parsing function on an affected system. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition or execute arbitrary code on an affected device.

CVE-2017-12380
7. ClamAV Null Dereference Vulnerability

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

The vulnerability is due to improper input validation checking mechanisms during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.

 



Erstelldatum
Dateigröße
Downloads
27.01.2018 18:25:36
6.17 MB
240
tgz.png clamav_0.99.2-1-bundle_copfilter-v2 0.99.2-1 Beliebt

Download

Clamav 0.99.1 for Copfilter v2 (with c-icap 0.4.4 / c-icap modules 0.4.4 and havp 0.92a)

 

md5sum:  6c647c090ce929d0809c7b1238d0efc8
sha1sum: 3dd5582ce7144bdb523362a8ea9298a16eb34e02

 

 

 



Erstelldatum
Dateigröße
Downloads
26.11.2016 19:34:28
5.85 MB
511
tgz.png clamav_0.99.1-pack_copfilter-v2.tgz 0.99.1 Beliebt

Download

Clamav 0.99.1 for Copfilter v2 (with c-icap 0.4.2 / c-icap modules 0.4.2)

 

Bugfix release

 

md5sum: 2f17ec4df9a76a84adfdc28993940183
sha1sum: d3791409aa9d5afc793c950f84133de01373871b

 

 

 



Erstelldatum
Dateigröße
Downloads
13.03.2016 21:33:10
5.84 MB
644
tgz.png clamav_0.99-pack_copfilter-v2.tgz 0.99 Beliebt

Download

Clamav 0.99 for Copfilter Copfilter v2 (with c-icap 0.4.2 & c-icap-modules 0.4.2 and missing havp)

 

Please note: previous clamav-0.99 update package was missing recompiled havp! If you already installed previous clamav update, please enforce reinstall!

 

ClamAV 0.99 contains major new features and changes. YARA rules,
Perl Compatible Regular Expressions, revamped on-access scanning
for Linux, and other new features join the many great features of ClamAV:



  *   Processing of YARA rules (some limitations- see signatures.pdf).
  *   Support in ClamAV logical signatures for many of the features added for YARA, such as Perl Compatible Regular Expressions, alternate strings, and YARA string attributes. See signatures.pdf for full details.
  *   New and improved on-access scanning for Linux. See the recent blog post and clamdoc.pdf for details on the new on-access capabilities.
  *   A new ClamAV API callback function that is invoked when a virus is found. This is intended primarily for applications running in all-match mode. Any applications using all-match mode must use the new callback function to record and report detected viruses.
  *   Configurable default password list to attempt zip file decryption.
  *   TIFF file support.
  *   Upgrade Windows pthread library to 2.9.1.
  *   A new signature target type for designating signatures to run against files with unknown file types.
  *   Improved fidelity of the "data loss prevention" heuristic algorithm. Code supplied by Bill Parker.
  *   Support for LZMA decompression within Adobe Flash files.
  *   Support for MSO attachments within Microsoft Office 2003 XML files.
  *   A new sigtool option(--ascii-normalize) allowing signature authors to more easily generate normalized versions of ascii files.
  *   Windows installation directories changed from Program FilesSourcefireClamAV to Program FilesClamAV or Program FilesClamAV-x64.

 

md5sum: d185d9a2411509f0ebc8e76eca658c70
sha1sum: b672409d8ec048e6d766dcda693e3a5728573563
sha256sum: 829cc629d1ca1026b253d53fa7aefc65c0ebb2a287efc9df8f41217114aced33


 

 

 



Erstelldatum
Dateigröße
Downloads
06.12.2015 10:26:37
5.83 MB
681
tgz.png clamav_0.98.7_copfilter-v2.tgz 0.98.7 Beliebt

Download

Clamav 0.98.7 for Copfilter Copfilter v2

 

md5sum: 066b66339da55a2c31fbb4777adc52c0

 

 



Erstelldatum
Dateigröße
Downloads
09.08.2015 20:37:12
1.61 MB
763
tgz.png clamav_0.98.4_copfilter_2.1.92betax.tgz 0.98.4 Beliebt

Download

Clamav 0.98.4 for Copfilter Copfilter v2 (Bugfix Release)

 

German Copilter Forum: ClamAV 0.98.4

English Copfilter Forum: ClamAV 0.98.4

 

Changelog:

  • Various build problems on Solaris, OpenBSD, AIX
  • Infinite loop in clamdscan when clamd is not running
  • Buffer underruns when handling multi-part MIME email attachments
  • Linking issues with libclamunrar

complete changelog

 

md5sum:  019bfb52152900e41886c353cb6cc453

 



Erstelldatum
Dateigröße
Downloads
17.06.2014 16:04:17
5.6 MB
675
Cookie Einstellungen
Auf Grund einer EU-Richtlinie müssen wir Sie darauf hinweisen, dass wir zur Bereitstellung unserer Dienste Cookies einsetzen.
Mit der Nutzung unserer Dienste erklären Sie sich damit einverstanden, dass wir Cookies verwenden.
Weitere Informationen Ok Ablehnen