This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
iDefense Security Advisory 02.12.08 :
Remote exploitation of an integer overflow vulnerability in Clam
AntiVirus' ClamAV, as included in various vendors' operating system
distributions, allows attackers to execute arbitrary code with the
privileges of the affected process.
The vulnerability exists within the code responsible for parsing and
scanning PE files. While iterating through all sections contained in
the PE file, several attacker controlled values are extracted from the
file. On each iteration, arithmetic operations are performed without
taking into consideration 32-bit integer wrap.
Since insufficient integer overflow checks are present, an attacker
can cause a heap overflow by causing a specially crafted Petite packed
PE binary to be scanned. This results in an exploitable memory
Exploitation of this vulnerability results in the execution of
arbitrary code with the privileges of the process using libclamav. In
the case of the clamd program, this will result in code execution with
the privileges of the clamav user. Unsuccessful exploitation results
in the clamd process crashing. Workaround Disabling the scanning of PE
files will prevent exploitation.
If using clamscan, this can be done by running clamscan with the
If using clamdscan, set the 'ScanPE' option in the clamd.conf file to
See also :
Update the affected package.
Risk factor :
Critical / CVSS Base Score : 10.0