<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">clamav-0.103.3-1.4 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10685-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">clamav-0.103.3-1.4 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the clamav-0.103.3-1.4 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10685</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2005-3239/</URL>
      <Description>SUSE CVE CVE-2005-3239 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2005-3303/</URL>
      <Description>SUSE CVE CVE-2005-3303 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-1614/</URL>
      <Description>SUSE CVE CVE-2006-1614 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-1989/</URL>
      <Description>SUSE CVE CVE-2006-1989 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-4182/</URL>
      <Description>SUSE CVE CVE-2006-4182 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-5874/</URL>
      <Description>SUSE CVE CVE-2006-5874 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-0897/</URL>
      <Description>SUSE CVE CVE-2007-0897 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-0898/</URL>
      <Description>SUSE CVE CVE-2007-0898 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-1745/</URL>
      <Description>SUSE CVE CVE-2007-1745 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-1997/</URL>
      <Description>SUSE CVE CVE-2007-1997 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-6335/</URL>
      <Description>SUSE CVE CVE-2007-6335 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-6336/</URL>
      <Description>SUSE CVE CVE-2007-6336 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-6337/</URL>
      <Description>SUSE CVE CVE-2007-6337 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-6595/</URL>
      <Description>SUSE CVE CVE-2007-6595 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-6596/</URL>
      <Description>SUSE CVE CVE-2007-6596 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0318/</URL>
      <Description>SUSE CVE CVE-2008-0318 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0728/</URL>
      <Description>SUSE CVE CVE-2008-0728 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-1100/</URL>
      <Description>SUSE CVE CVE-2008-1100 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-2713/</URL>
      <Description>SUSE CVE CVE-2008-2713 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1205/</URL>
      <Description>SUSE CVE CVE-2010-1205 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-6706/</URL>
      <Description>SUSE CVE CVE-2012-6706 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11423/</URL>
      <Description>SUSE CVE CVE-2017-11423 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12374/</URL>
      <Description>SUSE CVE CVE-2017-12374 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12375/</URL>
      <Description>SUSE CVE CVE-2017-12375 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12376/</URL>
      <Description>SUSE CVE CVE-2017-12376 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12377/</URL>
      <Description>SUSE CVE CVE-2017-12377 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12378/</URL>
      <Description>SUSE CVE CVE-2017-12378 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12379/</URL>
      <Description>SUSE CVE CVE-2017-12379 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12380/</URL>
      <Description>SUSE CVE CVE-2017-12380 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6418/</URL>
      <Description>SUSE CVE CVE-2017-6418 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6419/</URL>
      <Description>SUSE CVE CVE-2017-6419 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6420/</URL>
      <Description>SUSE CVE CVE-2017-6420 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-0202/</URL>
      <Description>SUSE CVE CVE-2018-0202 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-0360/</URL>
      <Description>SUSE CVE CVE-2018-0360 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-0361/</URL>
      <Description>SUSE CVE CVE-2018-0361 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1000085/</URL>
      <Description>SUSE CVE CVE-2018-1000085 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14680/</URL>
      <Description>SUSE CVE CVE-2018-14680 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15378/</URL>
      <Description>SUSE CVE CVE-2018-15378 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-12625/</URL>
      <Description>SUSE CVE CVE-2019-12625 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-12900/</URL>
      <Description>SUSE CVE CVE-2019-12900 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15961/</URL>
      <Description>SUSE CVE CVE-2019-15961 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1785/</URL>
      <Description>SUSE CVE CVE-2019-1785 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1786/</URL>
      <Description>SUSE CVE CVE-2019-1786 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1787/</URL>
      <Description>SUSE CVE CVE-2019-1787 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1788/</URL>
      <Description>SUSE CVE CVE-2019-1788 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1789/</URL>
      <Description>SUSE CVE CVE-2019-1789 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1798/</URL>
      <Description>SUSE CVE CVE-2019-1798 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3123/</URL>
      <Description>SUSE CVE CVE-2020-3123 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3327/</URL>
      <Description>SUSE CVE CVE-2020-3327 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3341/</URL>
      <Description>SUSE CVE CVE-2020-3341 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3350/</URL>
      <Description>SUSE CVE CVE-2020-3350 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3481/</URL>
      <Description>SUSE CVE CVE-2020-3481 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-1252/</URL>
      <Description>SUSE CVE CVE-2021-1252 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-1404/</URL>
      <Description>SUSE CVE CVE-2021-1404 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-1405/</URL>
      <Description>SUSE CVE CVE-2021-1405 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="clamav-0.103.3-1.4">
      <FullProductName ProductID="clamav-0.103.3-1.4">clamav-0.103.3-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="clamav-devel-0.103.3-1.4">
      <FullProductName ProductID="clamav-devel-0.103.3-1.4">clamav-devel-0.103.3-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="clamav-milter-0.103.3-1.4">
      <FullProductName ProductID="clamav-milter-0.103.3-1.4">clamav-milter-0.103.3-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libclamav9-0.103.3-1.4">
      <FullProductName ProductID="libclamav9-0.103.3-1.4">libclamav9-0.103.3-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreshclam2-0.103.3-1.4">
      <FullProductName ProductID="libfreshclam2-0.103.3-1.4">libfreshclam2-0.103.3-1.4</FullProductName>
    </Branch>
    <Relationship ProductReference="clamav-0.103.3-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:clamav-0.103.3-1.4">clamav-0.103.3-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="clamav-devel-0.103.3-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:clamav-devel-0.103.3-1.4">clamav-devel-0.103.3-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="clamav-milter-0.103.3-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:clamav-milter-0.103.3-1.4">clamav-milter-0.103.3-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libclamav9-0.103.3-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libclamav9-0.103.3-1.4">libclamav9-0.103.3-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreshclam2-0.103.3-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4">libfreshclam2-0.103.3-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The OLE2 unpacker in clamd in Clam AntiVirus (ClamAV) 0.87-1 allows remote attackers to cause a denial of service (segmentation fault) via a DOC file with an invalid property tree, which triggers an infinite recursion in the ole2_walk_property_tree function.</Note>
    </Notes>
    <CVE>CVE-2005-3239</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2005-3239.html</URL>
        <Description>CVE-2005-3239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/132305</URL>
        <Description>SUSE Bug 132305</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The FSG unpacker (fsg.c) in Clam AntiVirus (ClamAV) 0.80 through 0.87 allows remote attackers to cause "memory corruption" and execute arbitrary code via a crafted FSG 1.33 file.</Note>
    </Notes>
    <CVE>CVE-2005-3303</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2005-3303.html</URL>
        <Description>CVE-2005-3303</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/132305</URL>
        <Description>SUSE Bug 132305</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the cli_scanpe function in the PE header parser (libclamav/pe.c) in Clam AntiVirus (ClamAV) before 0.88.1, when ArchiveMaxFileSize is disabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code.</Note>
    </Notes>
    <CVE>CVE-2006-1614</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-1614.html</URL>
        <Description>CVE-2006-1614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/164039</URL>
        <Description>SUSE Bug 164039</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the get_database function in the HTTP client in Freshclam in ClamAV 0.80 to 0.88.1 might allow remote web servers to execute arbitrary code via long HTTP headers.</Note>
    </Notes>
    <CVE>CVE-2006-1989</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-1989.html</URL>
        <Description>CVE-2006-1989</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/171496</URL>
        <Description>SUSE Bug 171496</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, allows remote attackers to cause a denial of service (scanning service crash) and execute arbitrary code via a crafted Portable Executable (PE) file that leads to a heap-based buffer overflow when less memory is allocated than expected.</Note>
    </Notes>
    <CVE>CVE-2006-4182</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-4182.html</URL>
        <Description>CVE-2006-4182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/212898</URL>
        <Description>SUSE Bug 212898</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Clam AntiVirus (ClamAV) 0.88 and earlier allows remote attackers to cause a denial of service (crash) via a malformed base64-encoded MIME attachment that triggers a null pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2006-5874</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-5874.html</URL>
        <Description>CVE-2006-5874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/227827</URL>
        <Description>SUSE Bug 227827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Clam AntiVirus ClamAV before 0.90 does not close open file descriptors under certain conditions, which allows remote attackers to cause a denial of service (file descriptor consumption and failed scans) via CAB archives with a cabinet header record length of zero, which causes a function to return without closing a file descriptor.</Note>
    </Notes>
    <CVE>CVE-2007-0897</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-0897.html</URL>
        <Description>CVE-2007-0897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/246214</URL>
        <Description>SUSE Bug 246214</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in clamd in Clam AntiVirus ClamAV before 0.90 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the id MIME header parameter in a multi-part message.</Note>
    </Notes>
    <CVE>CVE-2007-0898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-0898.html</URL>
        <Description>CVE-2007-0898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/246214</URL>
        <Description>SUSE Bug 246214</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The chm_decompress_stream function in libclamav/chmunpack.c in Clam AntiVirus (ClamAV) before 0.90.2 leaks file descriptors, which has unknown impact and attack vectors involving a crafted CHM file, a different vulnerability than CVE-2007-0897.  NOTE: some of these details are obtained from third party information.</Note>
    </Notes>
    <CVE>CVE-2007-1745</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-1745.html</URL>
        <Description>CVE-2007-1745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/264189</URL>
        <Description>SUSE Bug 264189</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer signedness error in the (1) cab_unstore and (2) cab_extract functions in libclamav/cab.c in Clam AntiVirus (ClamAV) before 0.90.2 allow remote attackers to execute arbitrary code via a crafted CHM file that contains a negative integer, which passes a signed comparison and leads to a stack-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2007-1997</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-1997.html</URL>
        <Description>CVE-2007-1997</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/264189</URL>
        <Description>SUSE Bug 264189</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2007-6335</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-6335.html</URL>
        <Description>CVE-2007-6335</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/343277</URL>
        <Description>SUSE Bug 343277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MS-ZIP compressed CAB file.</Note>
    </Notes>
    <CVE>CVE-2007-6336</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-6336.html</URL>
        <Description>CVE-2007-6336</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/343277</URL>
        <Description>SUSE Bug 343277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the bzip2 decompression algorithm in nsis/bzlib_private.h in ClamAV before 0.92 has unknown impact and remote attack vectors.</Note>
    </Notes>
    <CVE>CVE-2007-6337</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-6337.html</URL>
        <Description>CVE-2007-6337</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/343277</URL>
        <Description>SUSE Bug 343277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ClamAV 0.92 allows local users to overwrite arbitrary files via a symlink attack on (1) temporary files used by the cli_gentempfd function in libclamav/others.c or on (2) .ascii files used by sigtool, when utf16-decode is enabled.</Note>
    </Notes>
    <CVE>CVE-2007-6595</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-6595.html</URL>
        <Description>CVE-2007-6595</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/350987</URL>
        <Description>SUSE Bug 350987</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ClamAV 0.92 does not recognize Base64 UUEncoded archives, which allows remote attackers to bypass the scanner via a Base64-UUEncoded file.</Note>
    </Notes>
    <CVE>CVE-2007-6596</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-6596.html</URL>
        <Description>CVE-2007-6596</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/350987</URL>
        <Description>SUSE Bug 350987</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the cli_scanpe function in libclamav in ClamAV before 0.92.1, as used in clamd, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Petite packed PE file, which triggers a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2008-0318</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0318.html</URL>
        <Description>CVE-2008-0318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/361374</URL>
        <Description>SUSE Bug 361374</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The unmew11 function in libclamav/mew.c in libclamav in ClamAV before 0.92.1 has unknown impact and attack vectors that trigger "heap corruption."</Note>
    </Notes>
    <CVE>CVE-2008-0728</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0728.html</URL>
        <Description>CVE-2008-0728</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/361403</URL>
        <Description>SUSE Bug 361403</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the cli_scanpe function in libclamav (libclamav/pe.c) for ClamAV 0.92 and 0.92.1 allows remote attackers to execute arbitrary code via a crafted Upack PE file.</Note>
    </Notes>
    <CVE>CVE-2008-1100</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-1100.html</URL>
        <Description>CVE-2008-1100</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/368963</URL>
        <Description>SUSE Bug 368963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/379695</URL>
        <Description>SUSE Bug 379695</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libclamav/petite.c in ClamAV before 0.93.1 allows remote attackers to cause a denial of service via a crafted Petite file that triggers an out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2008-2713</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-2713.html</URL>
        <Description>CVE-2008-2713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/399302</URL>
        <Description>SUSE Bug 399302</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/406994</URL>
        <Description>SUSE Bug 406994</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.</Note>
    </Notes>
    <CVE>CVE-2010-1205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1205.html</URL>
        <Description>CVE-2010-1205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188284</URL>
        <Description>SUSE Bug 1188284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/617866</URL>
        <Description>SUSE Bug 617866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/622506</URL>
        <Description>SUSE Bug 622506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/639941</URL>
        <Description>SUSE Bug 639941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854395</URL>
        <Description>SUSE Bug 854395</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the "DestPos" variable, which allows the attacker to write out of bounds when setting Mem[DestPos].</Note>
    </Notes>
    <CVE>CVE-2012-6706</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-6706.html</URL>
        <Description>CVE-2012-6706</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045315</URL>
        <Description>SUSE Bug 1045315</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045490</URL>
        <Description>SUSE Bug 1045490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083915</URL>
        <Description>SUSE Bug 1083915</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2 and other products, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted CAB file.</Note>
    </Notes>
    <CVE>CVE-2017-11423</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11423.html</URL>
        <Description>CVE-2017-11423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049423</URL>
        <Description>SUSE Bug 1049423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083915</URL>
        <Description>SUSE Bug 1083915</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations (mbox.c operations on bounce messages). If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition.</Note>
    </Notes>
    <CVE>CVE-2017-12374</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12374.html</URL>
        <Description>CVE-2017-12374</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077732</URL>
        <Description>SUSE Bug 1077732</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions (the rfc2047 function in mbox.c). An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device.</Note>
    </Notes>
    <CVE>CVE-2017-12375</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12375.html</URL>
        <Description>CVE-2017-12375</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077732</URL>
        <Description>SUSE Bug 1077732</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause a handle_pdfname (in pdf.c) buffer overflow when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code.</Note>
    </Notes>
    <CVE>CVE-2017-12376</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12376.html</URL>
        <Description>CVE-2017-12376</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077732</URL>
        <Description>SUSE Bug 1077732</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap-based buffer over-read condition in mew.c when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device.</Note>
    </Notes>
    <CVE>CVE-2017-12377</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12377.html</URL>
        <Description>CVE-2017-12377</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077732</URL>
        <Description>SUSE Bug 1077732</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device.</Note>
    </Notes>
    <CVE>CVE-2017-12378</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12378.html</URL>
        <Description>CVE-2017-12378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077732</URL>
        <Description>SUSE Bug 1077732</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in the message parsing function on an affected system. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a messageAddArgument (in message.c) buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition or execute arbitrary code on an affected device.</Note>
    </Notes>
    <CVE>CVE-2017-12379</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12379.html</URL>
        <Description>CVE-2017-12379</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077732</URL>
        <Description>SUSE Bug 1077732</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.</Note>
    </Notes>
    <CVE>CVE-2017-12380</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12380.html</URL>
        <Description>CVE-2017-12380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077732</URL>
        <Description>SUSE Bug 1077732</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libclamav/message.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted e-mail message.</Note>
    </Notes>
    <CVE>CVE-2017-6418</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6418.html</URL>
        <Description>CVE-2017-6418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052466</URL>
        <Description>SUSE Bug 1052466</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mspack/lzxd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted CHM file.</Note>
    </Notes>
    <CVE>CVE-2017-6419</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6419.html</URL>
        <Description>CVE-2017-6419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052449</URL>
        <Description>SUSE Bug 1052449</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083915</URL>
        <Description>SUSE Bug 1083915</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The wwunpack function in libclamav/wwunpack.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression.</Note>
    </Notes>
    <CVE>CVE-2017-6420</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6420.html</URL>
        <Description>CVE-2017-6420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052448</URL>
        <Description>SUSE Bug 1052448</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">clamscan in ClamAV before 0.99.4 contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause an out-of-bounds read when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition. This concerns pdf_parse_array and pdf_parse_string in libclamav/pdfng.c. Cisco Bug IDs: CSCvh91380, CSCvh91400.</Note>
    </Notes>
    <CVE>CVE-2018-0202</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-0202.html</URL>
        <Description>CVE-2018-0202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083915</URL>
        <Description>SUSE Bug 1083915</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ClamAV before 0.100.1 has an HWP integer overflow with a resultant infinite loop via a crafted Hangul Word Processor file. This is in parsehwp3_paragraph() in libclamav/hwp.c.</Note>
    </Notes>
    <CVE>CVE-2018-0360</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-0360.html</URL>
        <Description>CVE-2018-0360</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101410</URL>
        <Description>SUSE Bug 1101410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103091</URL>
        <Description>SUSE Bug 1103091</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103092</URL>
        <Description>SUSE Bug 1103092</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103099</URL>
        <Description>SUSE Bug 1103099</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ClamAV before 0.100.1 lacks a PDF object length check, resulting in an unreasonably long time to parse a relatively small file.</Note>
    </Notes>
    <CVE>CVE-2018-0361</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-0361.html</URL>
        <Description>CVE-2018-0361</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101410</URL>
        <Description>SUSE Bug 1101410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101412</URL>
        <Description>SUSE Bug 1101412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103091</URL>
        <Description>SUSE Bug 1103091</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103092</URL>
        <Description>SUSE Bug 1103092</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103099</URL>
        <Description>SUSE Bug 1103099</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.</Note>
    </Notes>
    <CVE>CVE-2018-1000085</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000085.html</URL>
        <Description>CVE-2018-1000085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082858</URL>
        <Description>SUSE Bug 1082858</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083915</URL>
        <Description>SUSE Bug 1083915</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.</Note>
    </Notes>
    <CVE>CVE-2018-14680</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14680.html</URL>
        <Description>CVE-2018-14680</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102922</URL>
        <Description>SUSE Bug 1102922</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103032</URL>
        <Description>SUSE Bug 1103032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103040</URL>
        <Description>SUSE Bug 1103040</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the "unmew11()" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.</Note>
    </Notes>
    <CVE>CVE-2018-15378</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15378.html</URL>
        <Description>CVE-2018-15378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110723</URL>
        <Description>SUSE Bug 1110723</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.</Note>
    </Notes>
    <CVE>CVE-2019-12625</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-12625.html</URL>
        <Description>CVE-2019-12625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1144504</URL>
        <Description>SUSE Bug 1144504</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.</Note>
    </Notes>
    <CVE>CVE-2019-12900</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-12900.html</URL>
        <Description>CVE-2019-12900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1139083</URL>
        <Description>SUSE Bug 1139083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141513</URL>
        <Description>SUSE Bug 1141513</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149458</URL>
        <Description>SUSE Bug 1149458</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.</Note>
    </Notes>
    <CVE>CVE-2019-15961</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15961.html</URL>
        <Description>CVE-2019-15961</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157763</URL>
        <Description>SUSE Bug 1157763</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180082</URL>
        <Description>SUSE Bug 1180082</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.</Note>
    </Notes>
    <CVE>CVE-2019-1785</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1785.html</URL>
        <Description>CVE-2019-1785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130721</URL>
        <Description>SUSE Bug 1130721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137508</URL>
        <Description>SUSE Bug 1137508</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.</Note>
    </Notes>
    <CVE>CVE-2019-1786</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1786.html</URL>
        <Description>CVE-2019-1786</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130721</URL>
        <Description>SUSE Bug 1130721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137510</URL>
        <Description>SUSE Bug 1137510</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.</Note>
    </Notes>
    <CVE>CVE-2019-1787</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1787.html</URL>
        <Description>CVE-2019-1787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130721</URL>
        <Description>SUSE Bug 1130721</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the Object Linking &amp; Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.</Note>
    </Notes>
    <CVE>CVE-2019-1788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1788.html</URL>
        <Description>CVE-2019-1788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130721</URL>
        <Description>SUSE Bug 1130721</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.</Note>
    </Notes>
    <CVE>CVE-2019-1789</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1789.html</URL>
        <Description>CVE-2019-1789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130721</URL>
        <Description>SUSE Bug 1130721</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.</Note>
    </Notes>
    <CVE>CVE-2019-1798</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1798.html</URL>
        <Description>CVE-2019-1798</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130721</URL>
        <Description>SUSE Bug 1130721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137513</URL>
        <Description>SUSE Bug 1137513</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.</Note>
    </Notes>
    <CVE>CVE-2020-3123</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3123.html</URL>
        <Description>CVE-2020-3123</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162921</URL>
        <Description>SUSE Bug 1162921</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.</Note>
    </Notes>
    <CVE>CVE-2020-3327</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3327.html</URL>
        <Description>CVE-2020-3327</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171980</URL>
        <Description>SUSE Bug 1171980</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174250</URL>
        <Description>SUSE Bug 1174250</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.</Note>
    </Notes>
    <CVE>CVE-2020-3341</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3341.html</URL>
        <Description>CVE-2020-3341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171981</URL>
        <Description>SUSE Bug 1171981</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the attacker to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working.</Note>
    </Notes>
    <CVE>CVE-2020-3350</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3350.html</URL>
        <Description>CVE-2020-3350</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174250</URL>
        <Description>SUSE Bug 1174250</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174255</URL>
        <Description>SUSE Bug 1174255</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.</Note>
    </Notes>
    <CVE>CVE-2020-3481</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3481.html</URL>
        <Description>CVE-2020-3481</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174250</URL>
        <Description>SUSE Bug 1174250</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the Excel XLM macro parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper error handling that may result in an infinite loop. An attacker could exploit this vulnerability by sending a crafted Excel file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process hang, resulting in a denial of service condition.</Note>
    </Notes>
    <CVE>CVE-2021-1252</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-1252.html</URL>
        <Description>CVE-2021-1252</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184532</URL>
        <Description>SUSE Bug 1184532</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.</Note>
    </Notes>
    <CVE>CVE-2021-1404</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-1404.html</URL>
        <Description>CVE-2021-1404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184533</URL>
        <Description>SUSE Bug 1184533</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the email parsing module in Clam AntiVirus (ClamAV) Software version 0.103.1 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper variable initialization that may result in an NULL pointer read. An attacker could exploit this vulnerability by sending a crafted email to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.</Note>
    </Notes>
    <CVE>CVE-2021-1405</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav9-0.103.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-1405.html</URL>
        <Description>CVE-2021-1405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184534</URL>
        <Description>SUSE Bug 1184534</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
