This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote mail server allows execution of arbitrary commands.
The remote host appears to be running a version of Clamav-milter, a
filter for sendmail, configured with '--black-hole-mode' that fails to
sanitize recipient addresses of shell metacharacters before using them
in a call to 'popen()' to determine whether to discard incoming
messages. An unauthenticated, remote attacker can leverage this issue
to execute arbitrary code, typically as root.
See also :
Upgrade to ClamAV 0.91.2 or later.
Risk factor :
High / CVSS Base Score : 7.6
CVSS Temporal Score : 6.6
Public Exploit Available : true