This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Secunia reports :
Some vulnerabilities have been reported in ClamAV, which can be
exploited by malicious people to cause a DoS (Denial of Service) or to
compromise a vulnerable system.
1) A boundary error exists within the 'cli_scanpe()' function in
libclamav/pe.c. This can be exploited to cause a heap-based buffer
overflow via a specially crafted 'Upack' executable.
Successful exploitation allows execution of arbitrary code.
2) A boundary error within the processing of PeSpin packed executables
in libclamav/spin.c can be exploited to cause a heap-based buffer
Successful exploitation may allow execution of arbitrary code.
3) An unspecified error in the processing of ARJ files can be
exploited to hang ClamAV.
See also :
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 31983 (freebsd_pkg_589d80530b0311ddb4ef00e07dc4ec84.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now