Thursday, March 23, 2023

Effective March 28, 2023, ClamAV 0.104.0 (and all patch versions) will no longer be supported in accordance with ClamAV's EOL policy

End of life (EOL) for ClamAV means: 

  • We will no longer be testing against that version when we write signatures. 
  • That version may no longer be working as part of future updates. 
  • Signature updates for that version will be blocked when attempting to download from the mirror update system. 

Please upgrade to a supported version of ClamAV, currently at 0.103.8, 0.105.2, and 1.0.1, available for download now.

Wednesday, February 15, 2023

 Today, we are releasing the following critical patch versions for ClamAV:

  • 0.103.8
  • 0.105.2
  • 1.0.1

ClamAV 0.104 has reached end-of-life according to the ClamAV End of Life (EOL) policy and will not be patched. Anyone using ClamAV 0.104 must switch to a supported version. All users should update as soon as possible to patch for the remote code execution vulnerability and remote information leak vulnerability.

Edit: We are aware that technical details for CVE-2023-20032 and a proof-of-concept sample to demonstrate the buffer overflow are publicly available.

The release files are available for download on ClamAV.net, on the Github Release page, and through Docker Hub.

1.0.1

ClamAV 1.0.1 is a critical patch release with the following fixes:

  • CVE-2023-20032: Fixed a possible remote code execution vulnerability in the HFS+ file parser. The issue affects versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier. Thank you to Simon Scannell for reporting this issue.

  • CVE-2023-20052: Fixed a possible remote information leak vulnerability in the DMG file parser. The issue affects versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier. Thank you to Simon Scannell for reporting this issue.

  • Fix an allmatch detection issue with the preclass bytecode hook.

  • Update the vendored libmspack library to version 0.11alpha.

0.105.2

ClamAV 0.105.2 is a critical patch release with the following fixes:

  • CVE-2023-20032: Fixed a possible remote code execution vulnerability in the HFS+ file parser. The issue affects versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier. Thank you to Simon Scannell for reporting this issue.

  • CVE-2023-20052: Fixed a possible remote information leak vulnerability in the DMG file parser. The issue affects versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier. Thank you to Simon Scannell for reporting this issue.

  • Fixed an issue loading Yara rules containing regex strings with an escaped forward-slash (\/) followed by a colon (:).

  • Moved the ClamAV Docker files for building containers to a new Git repository. The Docker files are now in https://github.com/Cisco-Talos/clamav-docker. This change enables us to fix issues with the images and with the supporting scripts used to publish and update the images without committing changes directly to files in the ClamAV release branches.

  • Update the vendored libmspack library to version 0.11alpha.

0.103.8

ClamAV 0.103.8 is a critical patch release with the following fixes:

  • CVE-2023-20032: Fixed a possible remote code execution vulnerability in the HFS+ file parser. The issue affects versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier. Thank you to Simon Scannell for reporting this issue.

  • CVE-2023-20052: Fixed a possible remote information leak vulnerability in the DMG file parser. The issue affects versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier. Thank you to Simon Scannell for reporting this issue.

  • Update the vendored libmspack library to version 0.11alpha.

Monday, November 28, 2022

The ClamAV 1.0.0 feature release is now stable and available for download on ClamAV.net or through Docker Hub.  

ClamAV 1.0.0 includes the following improvements and changes.

Major changes

  • Support for decrypting read-only OLE2-based XLS files that are encrypted with the default password. Use of the default password will now appear in the metadata JSON.

  • Overhauled the implementation of the all-match feature. The newer code is more reliable and easier to maintain.

    • This project fixed several known issues with signature detection in all- match mode:

      • Enabled embedded file-type recognition signatures to match when a malware signature also matched in a scan of the same layer.

      • Enabled bytecode signatures to run in all-match mode after a match has occurred.

      • Fixed an assortment of all-match edge case issues.

    • Added multiple test cases to verify correct all-match behavior.

    • GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/687

  • Added a new callback to the public API for inspecting file content during a scan at each layer of archive extraction.

    • The new callback function type is clcb_file_inspection defined in clamav.h.

    • The function cl_engine_set_clcb_file_inspection() may be used to enable the callback prior to performing a scan.

    • This new callback is to be considered unstable for the 1.0 release. We may alter this function in a subsequent feature version.

    • GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/170

  • Added a new function to the public API for unpacking CVD signature archives.

    • The new function is cl_cvdunpack(). The last parameter for the function may be set to verify if a CVD's signature is valid before unpacking the CVD content to the destination directory.

    • GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/690

  • The option to build with an external TomsFastMath library has been removed. ClamAV requires non-default build options for TomsFastMath to support bigger floating point numbers. Without this change, database and Windows EXE/DLL authenticode certificate validation may fail. The ENABLE_EXTERNAL_TOMSFASTMATH build is now ignored.

  • Moved the Dockerfile and supporting scripts from the main ClamAV repository over to a new repository: https://github.com/Cisco-Talos/clamav-docker

    The separate repository will make it easier to update the images and fix issues with images for released ClamAV versions.

    Any users building the ClamAV Docker image rather than pulling them from Docker Hub will have to get the latest Docker files from the new location.

  • Increased the SONAME major version for libclamav because of ABI changes between the 0.103 LTS release and the 1.0 LTS release.

Other improvements

  • Add checks to limit PDF object extraction recursion.

  • Increased the limit for memory allocations based on untrusted input and altered the warning message when the limit is exceeded so that it is more helpful and less dramatic.

  • Dramatically improved the build time of libclamav-Rust unit tests. The unit test build is included in the time limit for the test itself and was timing out on slower systems. The ClamAV Rust code modules now share the same build directory, which also reduces the amount of disk space used for the build.

  • For Windows: The debugging symbol (PDB) files are now installed alongside the DLL and LIB library files when built in "RelWithDebInfo" or "Debug" mode.

  • Relaxed the constraints on the check for overlapping ZIP file entries so as not to alert on slightly malformed, but non-malicious, Java (JAR) archives.

  • Increased the time limit in FreshClam before warning if the DNS entry is stale. In combination with changes to update the DNS entry more frequently, this should prevent false alarms of failures in the database publication system.

  • Docker: The C library header files are now included in the Docker image. Patch courtesy of GitHub user TerminalFi.

  • Show the BYTECODE_RUNTIME build options when using the ccmake GUI for CMake. Patch courtesy of Дилян Палаузов.

  • Added explicit minimum and maximum supported LLVM versions so that the build will fail if you try to build with a version that is too old or too new and will print a helpful message rather than simply failing to compile because of compatibility issues. Patch courtesy of Matt Jolly.

  • Fixed compiler warnings that may turn into errors in Clang 16. Patch courtesy of Michael Orlitzky.

  • Allow building with a custom RPATH so that the executables may be moved after build in a development environment to a final installation directory.

Bug fixes

Acknowledgments

Special thanks to the following people for code contributions and bug reports:

  • Anthony Chan

  • Ben Bodenmiller

  • Дилян Палаузов

  • Liam Jarvis

  • Matt Jolly

  • Michael Orlitzky

  • monkz

  • teoberi

  • TerminalFi

Tuesday, November 15, 2022

Today we are publishing a second release candidate for ClamAV 1.0.0. If you didn't get a chance to test the 1.0.0 release candidate yet, please have a look before we publish the stable release. You can find the ClamAV 1.0.0-rc2 release candidate files on the ClamAV.net Downloads page.

We expect to publish the stable 1.0.0 release in two weeks.

Today we are also publishing updated packages for ClamAV 0.105.1.

Why we updated the 0.105.1 packages, again

On October 31st, we repackaged all currently supported ClamAV versions to patch the bundled libxml2 and zlib library dependencies. For 0.105.1, this was intended to also include bug fixes for the jpeg and tiff Rust-based libraries that are bundled with the source code tarball. Unfortunately, those fixes were not all release-ready in time for the 0.105.1-2 packages. We have fixed the issue and are now publishing a third revision for ClamAV 0.105.1 packages.

Where to find the updated packages

The new packages have a "-3" suffix to indicate the package revision. For example, clamav-0.105.1-3.macos.universal.pkg is the updated package replacing clamav-0.105.1-2.macos.universal.pkg.

As always, you can get the updated packages from the ClamAV.net Downloads page. The original packages have been hidden on the web page and replaced by the updated packages. If you need the originals, the URLs to download them still work.

1.0.0-rc2 release notes

ClamAV 1.0.0-rc2 includes the following improvements and changes.

Major changes:

  • Support for decrypting read-only OLE2-based XLS files that are encrypted with the default password. Use of the default password will now appear in the metadata JSON.

  • Overhauled the implementation of the all-match feature. The newer code is more reliable and easier to maintain.

    • This project fixed several known issues with signature detection in all- match mode:

      • Enabled embedded file-type recognition signatures to match when a malware signature also matched in a scan of the same layer.

      • Enabled bytecode signatures to run in all-match mode after a match has occurred.

      • Fixed an assortment of all-match edge case issues.

    • Added multiple test cases to verify correct all-match behavior.

    • GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/687

  • Added a new callback to the public API for inspecting file content during a scan at each layer of archive extraction.

    • The new callback function type is clcb_file_inspection defined in clamav.h.

    • The function cl_engine_set_clcb_file_inspection() may be used to enable the callback prior to performing a scan.

    • This new callback is to be considered unstable for the 1.0 release. We may alter this function in a subsequent feature version.

    • GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/170

  • Added a new function to the public API for unpacking CVD signature archives.

    • The new function is cl_cvdunpack(). The last parameter for the function may be set to verify if a CVD's signature is valid before unpacking the CVD content to the destination directory.

    • GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/690

  • The option to build with an external TomsFastMath library has been removed. ClamAV requires non-default build options for TomsFastMath to support bigger floating point numbers. Without this change, database and Windows EXE/DLL authenticode certificate validation may fail. The ENABLE_EXTERNAL_TOMSFASTMATH build is now ignored.

Other improvements:

  • Add checks to limit PDF object extraction recursion.

  • Increased the limit for memory allocations based on untrusted input and altered the warning message when the limit is exceeded so that it is more helpful and less dramatic.

  • Dramatically improved the build time of libclamav-Rust unit tests. The unit test build is included in the time limit for the test itself and was timing out on slower systems. The ClamAV Rust code modules now share the same build directory, which also reduces the amount of disk space used for the build.

  • For Windows: The debugging symbol (PDB) files are now installed alongside the DLL and LIB library files when built in "RelWithDebInfo" or "Debug" mode.

  • Increased the time limit in FreshClam before warning if the DNS entry is stale. In combination with changes to update the DNS entry more frequently, this should prevent false alarms of failures in the database publication system.

  • Docker: The C library header files are now included in the Docker image. Patch courtesy of GitHub user TerminalFi.

  • Show the BYTECODE_RUNTIME build options when using the ccmake GUI for CMake. Patch courtesy of Дилян Палаузов.

  • Added explicit minimum and maximum supported LLVM versions so that the build will fail if you try to build with a version that is too old or too new and will print a helpful message rather than simply failing to compile because of compatibility issues. Patch courtesy of Matt Jolly.

Bug fixes:

Acknowledgments

Special thanks to the following people for code contributions and bug reports:

  • Ben Bodenmiller

  • Дилян Палаузов

  • Liam Jarvis

  • Matt Jolly

  • monkz

  • teoberi

  • TerminalFi