FreeBSD : clamav -- Multiple Vulnerabilities (6a5174bd-c580-11da-9110-00123ffe8333)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Secunia reports :

Some vulnerabilities have been reported in ClamAV, which potentially
can be exploited by malicious people to cause a DoS (Denial of
Service) and compromise a vulnerable system.

An unspecified integer overflow error exists in the PE header parser
in 'libclamav/pe.c'. Successful exploitation requires that the
ArchiveMaxFileSize option is disabled.

Some format string errors in the logging handling in 'shared/output.c'
may be exploited to execute arbitrary code.

An out-of-bounds memory access error in the 'cli_bitset_test()'
function in 'ibclamav/others.c' may be exploited to cause a crash.

See also :

http://www.nessus.org/u?585d6e2f

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21446 (freebsd_pkg_6a5174bdc58011da911000123ffe8333.nasl)

Bugtraq ID:

CVE ID: CVE-2006-1614
CVE-2006-1615
CVE-2006-1630

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now