This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200805-19
(ClamAV: Multiple vulnerabilities)
Multiple vulnerabilities have been reported:
Damian Put reported a heap-based buffer overflow when processing PeSpin
packed PE binaries (CVE-2008-0314).
Alin Rad Pop of Secunia Research reported a buffer overflow in the
cli_scanpe() function when processing Upack PE binaries
Hanno Boeck reported an infinite loop when processing ARJ archives
Damian Put and Thomas Pollet reported a heap-based buffer overflow when
processing WWPack compressed PE binaries (CVE-2008-1833).
A buffer over-read was discovered in the rfc2231() function when
producing a string that is not NULL terminated (CVE-2008-1836).
An unspecified vulnerability leading to 'memory problems' when scanning
RAR files was reported (CVE-2008-1837).
Thierry Zoller reported that scanning of RAR files could be
A remote attacker could entice a user or automated system to scan a
specially crafted file, possibly leading to the execution of arbitrary
code with the privileges of the user running ClamAV (either a system
user or the 'clamav' user if clamd is compromised), or a Denial of
There is no known workaround at this time.
See also :
All ClamAV users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-antivirus/clamav-0.93'
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Gentoo Local Security Checks
Nessus Plugin ID: 32417 (gentoo_GLSA-200805-19.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now