How to Buy
This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200909-04
(Clam AntiVirus: Multiple vulnerabilities)
Multiple vulnerabilities have been found in ClamAV:
vendor reported a Divide-by-zero error in the PE ('Portable
Windows .exe) file handling of ClamAV
Jeffrey Thomas Peckham found a flaw in
libclamav/untar.c, possibly resulting in an infinite loop when
processing TAR archives in clamd and clamscan (CVE-2009-1270).
Martin Olsen reported a vulnerability in the CLI_ISCONTAINED macro
in libclamav/others.h, when processing UPack archives
Nigel disclosed a stack-based buffer overflow
in the 'cli_url_canon()' function in libclamav/phishcheck.c when
processing URLs (CVE-2009-1372).
A remote attacker could entice a user or automated system to process a
specially crafted UPack archive or a file containing a specially
crafted URL, possibly resulting in the remote execution of arbitrary
code with the privileges of the user running the application, or a
Denial of Service. Furthermore, a remote attacker could cause a Denial
of Service by supplying a specially crafted TAR archive or PE
executable to a Clam AntiVirus instance.
There is no known workaround at this time.
See also :
All Clam AntiVirus users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-antivirus/clamav-0.95.2'
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : false
Family: Gentoo Local Security Checks
Nessus Plugin ID: 40912 (gentoo_GLSA-200909-04.nasl)
CVE ID: CVE-2008-6680CVE-2009-1270CVE-2009-1371CVE-2009-1372
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.