Double free vulnerability in the vba_read_project_strings function in vba_extract.c in libclamav in ClamAV before 0.97 might allow remote attackers to execute arbitrary code via crafted Visual Basic for Applications (VBA) data in a Microsoft Office document. NOTE: some of these details are obtained from third party information.
https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2486
https://exchange.xforce.ibmcloud.com/vulnerabilities/65544
http://www.vupen.com/english/advisories/2011/0523
http://www.vupen.com/english/advisories/2011/0458
http://www.vupen.com/english/advisories/2011/0453
http://www.ubuntu.com/usn/USN-1076-1
http://www.securityfocus.com/bid/46470
http://www.mandriva.com/en/support/security/advisories/?name=MDVA-2011:007
http://securitytracker.com/id?1025100
http://secunia.com/advisories/43752
http://secunia.com/advisories/43498
http://secunia.com/advisories/43392
http://openwall.com/lists/oss-security/2011/02/21/4
http://openwall.com/lists/oss-security/2011/02/21/1
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055777.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055771.html
http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob%3Bf=ChangeLog%3Bhb=clamav-0.97