Antivirus Toolkit
Clam AntiVirus is an open source (GPL) anti-virus toolkit for UNIX,
designed especially for e-mail scanning on mail gateways. It provides a
number of utilities including a flexible and scalable multi-threaded
daemon, a command line scanner and advanced tool for automatic database
updates. The core of the package is an anti-virus engine available in a
form of shared library.
Here is a list of the main features:
* command-line scanner
* fast, multi-threaded daemon with support for on-access scanning
* milter interface for sendmail
* advanced database updater with support for scripted updates and
digital signatures
* virus scanner C library
* on-access scanning (Linux and FreeBSD)
* virus database updated multiple times per day (see home page for
total number of signatures)
* built-in support for various archive formats, including Zip, RAR,
Tar, Gzip, Bzip2, OLE2, Cabinet, CHM, BinHex, SIS and others
* built-in support for almost all mail file formats
* built-in support for ELF executables and Portable Executable files
compressed with UPX, FSG, Petite, NsPack, wwpack32, MEW, Upack
and obfuscated with SUE, Y0da Cryptor and others
* built-in support for popular document formats including MS Office and
MacOffice files, HTML, RTF and PDF
- Developed at security
- Sources inherited from project openSUSE:Factory
-
5
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:42:Factory-Candidates-Check/clamav && cd $_
- Create Badge
Source Files
Filename | Size | Changed |
---|---|---|
clamav-0.99.3.tar.gz | 0016082645 15.3 MB | |
clamav-conf.patch | 0000006606 6.45 KB | |
clamav-disable-timestamps.patch | 0000002747 2.68 KB | |
clamav-fix_newer_zlib.patch | 0000001689 1.65 KB | |
clamav-gcc47.patch | 0000000528 528 Bytes | |
clamav-rpmlintrc | 0000000114 114 Bytes | |
clamav-tmpfiles.conf | 0000000069 69 Bytes | |
clamav.changes | 0000061008 59.6 KB | |
clamav.keyring | 0000002532 2.47 KB | |
clamav.spec | 0000006786 6.63 KB | |
service.clamav-milter | 0000000299 299 Bytes | |
service.clamd | 0000000252 252 Bytes | |
service.freshclam | 0000000228 228 Bytes |
Revision 90 (latest revision is 124)
- Update to security release 0.99.3 (bsc#1077732) * CVE-2017-12376 (ClamAV Buffer Overflow in handle_pdfname Vulnerability) * CVE-2017-12377 (ClamAV Mew Packet Heap Overflow Vulnerability) * CVE-2017-12379 (ClamAV Buffer Overflow in messageAddArgument Vulnerability) - these vulnerabilities could have allowed an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. * CVE-2017-12374 (ClamAV use-after-free Vulnerabilities) * CVE-2017-12375 (ClamAV Buffer Overflow Vulnerability) * CVE-2017-12378 (ClamAV Buffer Over Read Vulnerability) * CVE-2017-12380 (ClamAV Null Dereference Vulnerability) - these vulnerabilities could have allowed an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. * CVE-2017-6420 (bsc#1052448) - this vulnerability allowed remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression. * CVE-2017-6419 (bsc#1052449) - ClamAV allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted CHM file. * CVE-2017-11423 (bsc#1049423) - The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha allowed remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted CAB file. * CVE-2017-6418 (bsc#1052466) - ClamAV 0.99.2 allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted e-mail message. - drop clamav-0.99.2-openssl-1.1.patch (upstream) (forwarded request 569976 from vitezslav_cizek)
Comments 7
Hello
May we get the version 1.0.1 ?
Version 1 is supplied by clamav team for several months.
Thanks
The current version is still actively maintained until later this year, so there is no rush to switch to 1.0.1 which still has some issues on big endian systems. But I am working at it, and meanwhile upstream has a release candidate for version 1.1, so we might switch directly to that one, or backport some of the fixes.
The current state of my work on 1.0.1 is available in my home project: https://build.opensuse.org/package/show/home:rmax:branches:security/clamav
thanks
Is there any hope to get some day on-access scanning ?
Well, clamonacc has been part of our ClamAV rpm for quite some time now, but unlike clamd and freshclam we haven't provided a systemd service file for it so far. I'll consider that for the 1.0.1 upgrade.
thanks
I've meanwhile added a service file for clamonacc to my branch package. Please try it out and let me know if it works for you. By default it only logs infected files, but doesn't move them.