This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200402-07
(Clam Antivirus DoS vulnerability)
Oliver Eikemeier of Fillmore Labs discovered the overflow in Clam AV 0.65
when it handled malformed UUEncoded messages, causing the daemon to shut
The problem originated in libclamav which calculates the line length of an
uuencoded message by taking the ASCII value of the first character minus 64
while doing an assertion if the length is not in the allowed range,
effectively terminating the calling program as clamav would not be
A malformed message would cause a denial of service,
and depending on the server configuration this may impact other daemons
relying on Clam AV in a fatal manner.
There is no immediate workaround, a software upgrade is required.
See also :
All users are urged to upgrade their Clam AV installations to Clam AV 0.67:
# emerge sync
# emerge -pv '>=app-antivirus/clamav-0.6.7'
# emerge '>=app-antivirus/clamav-0.6.7'
Risk factor :