[33518] in bugtraq

home help back first fref pref prev next nref lref last post

Re: clamav 0.65 remote DOS exploit

daemon@ATHENA.MIT.EDU (Nigel Horne)
Mon Feb 9 12:54:02 2004

From: Nigel Horne <njh@bandsman.co.uk>
To: Oliver Eikemeier <eikemeier@fillmore-labs.com>, bugs@clamav.net
Date: Mon, 9 Feb 2004 14:52:31 +0000
Cc: bugtraq@securityfocus.com
In-Reply-To: <40279811.9050407@fillmore-labs.com>
MIME-Version: 1.0
Content-Type: text/plain;
  charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: <200402091452.32197.njh@bandsman.co.uk>

I tried reproducing the problem with the latest source in CVS, but had no problems.
0.65 is rather old, please try again with the latest version.

[njh@mac tmp]$ clamscan --mbox f
f: OK

----------- SCAN SUMMARY -----------
Known viruses: 20667
Scanned directories: 0
Scanned files: 1
Infected files: 0
Data scanned: 0.00 MB
I/O buffer size: 131072 bytes
Time: 2.497 sec (0 m 2 s)
[njh@mac tmp]$ cat f
From -

begin 644 byebye
byebye
end
[njh@mac tmp]$

-Nigel

-- 
Nigel Horne. Arranger, Composer, Typesetter.
NJH Music, Barnsley, UK.  ICQ#20252325
njh@despammed.com http://www.bandsman.co.uk

home help back first fref pref prev next nref lref last post