This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
An Secunia Advisory reports :
Neel Mehta and Alex Wheeler have reported some vulnerabilities in Clam
AntiVirus, which can be exploited by malicious people to cause a DoS
(Denial of Service) or compromise a vulnerable system.
- Two integer overflow errors in 'libclamav/tnef.c' when processing
TNEF files can be exploited to cause a heap-based buffer overflow via
a specially crafted TNEF file with a length value of -1 in the header.
- An integer overflow error in 'libclamav/chmunpack.c' can be
exploited to cause a heap-based buffer overflow via a specially
crafted CHM file with a chunk entry that has a filename length of -1.
- A boundary error in 'libclamav/fsg.c' when processing a FSG
compressed file can cause a heap-based buffer overflow.
See also :
Update the affected packages.
Risk factor :
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 19337 (freebsd_pkg_1db7ecf5fd2411d9b4d60007e900f87b.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now