How to Buy
This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200805-19
(ClamAV: Multiple vulnerabilities)
Multiple vulnerabilities have been reported:
Damian Put reported a heap-based buffer overflow when processing PeSpin
packed PE binaries (CVE-2008-0314).
Alin Rad Pop of Secunia Research reported a buffer overflow in the
cli_scanpe() function when processing Upack PE binaries
Hanno Boeck reported an infinite loop when processing ARJ archives
Damian Put and Thomas Pollet reported a heap-based buffer overflow when
processing WWPack compressed PE binaries (CVE-2008-1833).
A buffer over-read was discovered in the rfc2231() function when
producing a string that is not NULL terminated (CVE-2008-1836).
An unspecified vulnerability leading to 'memory problems' when scanning
RAR files was reported (CVE-2008-1837).
Thierry Zoller reported that scanning of RAR files could be
A remote attacker could entice a user or automated system to scan a
specially crafted file, possibly leading to the execution of arbitrary
code with the privileges of the user running ClamAV (either a system
user or the 'clamav' user if clamd is compromised), or a Denial of
There is no known workaround at this time.
See also :
All ClamAV users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-antivirus/clamav-0.93'
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Gentoo Local Security Checks
Nessus Plugin ID: 32417 (gentoo_GLSA-200805-19.nasl)
CVE ID: CVE-2008-0314CVE-2008-1100CVE-2008-1387CVE-2008-1833CVE-2008-1835CVE-2008-1836CVE-2008-1837
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.