How to Buy
This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200706-05
(ClamAV: Multiple Denials of Service)
Several vulnerabilities were discovered in ClamAV by various
Victor Stinner (INL) discovered that the OLE2
parser may enter in an infinite loop (CVE-2007-2650).
boundary error was also reported by an anonymous researcher in the file
unsp.c, which might lead to a buffer overflow (CVE-2007-3023).
The file unrar.c contains a heap-based buffer overflow via a
modified vm_codesize value from a RAR file (CVE-2007-3123).
The RAR parsing engine can be bypassed via a RAR file with a header
flag value of 10 (CVE-2007-3122).
function from clamdscan creates temporary files with insecure
A remote attacker could send a specially crafted file to the scanner,
possibly triggering one of the vulnerabilities. The two buffer
overflows are reported to only cause Denial of Service. This would lead
to a Denial of Service by CPU consumption or a crash of the scanner.
The insecure temporary file creation vulnerability could be used by a
local user to access sensitive data.
There is no known workaround at this time.
See also :
All ClamAV users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-antivirus/clamav-0.90.3'
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Gentoo Local Security Checks
Nessus Plugin ID: 25534 (gentoo_GLSA-200706-05.nasl)
CVE ID: CVE-2007-2650CVE-2007-3023CVE-2007-3024CVE-2007-3122CVE-2007-3123
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.