Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 23 Jun 2004 11:01:41 GMT
From:      dawnshade <h-k@mail.ru>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   ports/68234: pop3vscan pass viruses to clients.
Message-ID:  <200406231101.i5NB1fMI099386@www.freebsd.org>
Resent-Message-ID: <200406231110.i5NBAH9G023800@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         68234
>Category:       ports
>Synopsis:       pop3vscan pass viruses to clients.
>Confidential:   no
>Severity:       serious
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Jun 23 11:10:16 GMT 2004
>Closed-Date:
>Last-Modified:
>Originator:     dawnshade
>Release:        5-CURRENT
>Organization:
>Environment:
FreeBSD gw 5.2-CURRENT FreeBSD 5.2-CURRENT #1: Fri Mar 19 16:40:08 MSK 2004     root@gw:/usr/obj/usr/src/sys/6  i386
kern.osreldate: 502108
>Description:
      Output message "TNEF_decode_tnef: Bad TNEF signature, expecting 223e9f78 got 789f3e22
TNEF read_16() Attempting to read past end" on ttyp0 and pass virus to client MUA.
Compiled WITHOUT_UVSCAN=YES. Using with clamav-0.73 from ports.
>How-To-Repeat:
      1) Install with WITHOUT_UVSCAN=YES
2) ipfw add 4000 fwd 192.168.0.1,8110 tcp from 192.168.0.0/24 to not me 110
3) Try to recieve some message with virus.

BTW, on 4.X releases this bug not shown.
>Fix:
      
>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200406231101.i5NB1fMI099386>