This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200402-07
(Clam Antivirus DoS vulnerability)
Oliver Eikemeier of Fillmore Labs discovered the overflow in Clam AV 0.65
when it handled malformed UUEncoded messages, causing the daemon to shut
The problem originated in libclamav which calculates the line length of an
uuencoded message by taking the ASCII value of the first character minus 64
while doing an assertion if the length is not in the allowed range,
effectively terminating the calling program as clamav would not be
A malformed message would cause a denial of service,
and depending on the server configuration this may impact other daemons
relying on Clam AV in a fatal manner.
There is no immediate workaround, a software upgrade is required.
See also :
All users are urged to upgrade their Clam AV installations to Clam AV 0.67:
# emerge sync
# emerge -pv '>=app-antivirus/clamav-0.6.7'
# emerge '>=app-antivirus/clamav-0.6.7'
Risk factor :
Family: Gentoo Local Security Checks
Nessus Plugin ID: 14451 (gentoo_GLSA-200402-07.nasl)
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.