This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote Mandriva Linux host is missing one or more security
Multiple vulnerabilities has been found and corrected in clamav :
Unspecified vulnerability in ClamAV before 0.95 allows remote
attackers to bypass detection of malware via a modified RAR archive
libclamav/pe.c in ClamAV before 0.95 allows remote attackers to cause
a denial of service (crash) via a crafted EXE file that triggers a
divide-by-zero error (CVE-2008-6680).
libclamav/untar.c in ClamAV before 0.95 allows remote attackers to
cause a denial of service (infinite loop) via a crafted file that
causes (1) clamd and (2) clamscan to hang (CVE-2009-1270).
The CLI_ISCONTAINED macro in libclamav/others.h in ClamAV before
0.95.1 allows remote attackers to cause a denial of service
(application crash) via a malformed file with UPack encoding
Stack-based buffer overflow in the cli_url_canon function in
libclamav/phishcheck.c in ClamAV before 0.95.1 allows remote attackers
to cause a denial of service (application crash) and possibly execute
arbitrary code via a crafted URL (CVE-2009-1372).
Important notice about this upgrade: clamav-0.95+ bundles support for
RAR v3 in libclamav which is a license violation as the RAR v3 license
and the GPL license is not compatible. As a consequence to this
Mandriva has been forced to remove the RAR v3 code.
This update provides clamav 0.95.1, which is not vulnerable to these
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : false
Family: Mandriva Local Security Checks
Nessus Plugin ID: 38165 (mandriva_MDVSA-2009-097.nasl)
Bugtraq ID: 34344
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now