Double free vulnerability in the vba_read_project_strings function in vba_extract.c in libclamav in ClamAV before 0.97 might allow remote attackers to execute arbitrary code via crafted Visual Basic for Applications (VBA) data in a Microsoft Office document. NOTE: some of these details are obtained from third party information.
git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob%3Bf=ChangeLog%3Bhb=clamav-0.97
git.clamav.net/gitweb?p=clamav-devel.git%3Ba=commit%3Bh=d21fb8d975f8c9688894a8cef4d50d977022e09f
lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
openwall.com/lists/oss-security/2011/02/21/1
openwall.com/lists/oss-security/2011/02/21/4
osvdb.org/70937
secunia.com/advisories/43392
secunia.com/advisories/43498
secunia.com/advisories/43752
securitytracker.com/id?1025100
www.mandriva.com/en/support/security/advisories/?name=MDVA-2011:007
www.securityfocus.com/bid/46470
www.ubuntu.com/usn/USN-1076-1
www.vupen.com/english/advisories/2011/0453
www.vupen.com/english/advisories/2011/0458
www.vupen.com/english/advisories/2011/0523
exchange.xforce.ibmcloud.com/vulnerabilities/65544
lists.fedoraproject.org/pipermail/package-announce/2011-March/055771.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/055777.html
wwws.clamav.net/bugzilla/show_bug.cgi?id=2486