GLSA-200402-07 : Clam Antivirus DoS vulnerability

This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200402-07
(Clam Antivirus DoS vulnerability)

Oliver Eikemeier of Fillmore Labs discovered the overflow in Clam AV 0.65
when it handled malformed UUEncoded messages, causing the daemon to shut
The problem originated in libclamav which calculates the line length of an
uuencoded message by taking the ASCII value of the first character minus 64
while doing an assertion if the length is not in the allowed range,
effectively terminating the calling program as clamav would not be

Impact :

A malformed message would cause a denial of service,
and depending on the server configuration this may impact other daemons
relying on Clam AV in a fatal manner.

Workaround :

There is no immediate workaround, a software upgrade is required.

See also :

Solution :

All users are urged to upgrade their Clam AV installations to Clam AV 0.67:
# emerge sync
# emerge -pv '>=app-antivirus/clamav-0.6.7'
# emerge '>=app-antivirus/clamav-0.6.7'

Risk factor :


Family: Gentoo Local Security Checks

Nessus Plugin ID: 14451 (gentoo_GLSA-200402-07.nasl)

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now