ClamAV before 0.93 allows remote attackers to cause a denial of service (CPU consumption) via a crafted ARJ archive, as demonstrated by the PROTOS GENOME test suite for Archive Formats.Referenceshttp://www.mandriva.com/security/advisories?name=MDVSA-2008:088https://exchange.xforce.ibmcloud.com/vulnerabilities/41822https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00249.htmlhttp://www.securityfocus.com/archive/1/490863/100/0/threadedhttp://security.gentoo.org/glsa/glsa-200805-19.xmlhttp://lists.apple.com/archives/security-announce//2008/Sep/msg00005.htmlhttps://www.clamav.net/bugzilla/show_bug.cgi?id=897http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.htmlhttp://int21.de/cve/CVE-2008-1387-clamav.htmlhttp://secunia.com/advisories/29891http://www.us-cert.gov/cas/techalerts/TA08-260A.htmlhttp://www.securityfocus.com/bid/28784http://www.vupen.com/english/advisories/2008/2584http://secunia.com/advisories/31882http://secunia.com/advisories/29975http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.htmlhttp://secunia.com/advisories/29863http://secunia.com/advisories/30328https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00625.htmlhttp://www.securityfocus.com/bid/28782http://secunia.com/advisories/30253http://secunia.com/advisories/31576http://www.vupen.com/english/advisories/2008/1227/referenceshttp://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00009.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-April/msg00576.htmlhttp://kolab.org/security/kolab-vendor-notice-20.txt