This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200509-13
(Clam AntiVirus: Multiple vulnerabilities)
Clam AntiVirus is vulnerable to a buffer overflow in
'libclamav/upx.c' when processing malformed UPX-packed executables. It
can also be sent into an infinite loop in 'libclamav/fsg.c' when
processing specially crafted FSG-packed executables.
By sending a specially crafted file an attacker could execute
arbitrary code with the permissions of the user running Clam AntiVirus,
or cause a Denial of Service.
There is no known workaround at this time.
See also :
All Clam AntiVirus users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-antivirus/clamav-0.87'
Risk factor :
High / CVSS Base Score : 7.5