Multiple vulnerabilities in ClamAV allow for the remote execution of arbitrary code or Denial of Service.
|Package||app-antivirus/clamav on all architectures|
|Affected versions||< 0.95.2|
|Unaffected versions||>= 0.95.2|
Clam AntiVirus (short: ClamAV) is an anti-virus toolkit for UNIX, designed especially for e-mail scanning on mail gateways.
Multiple vulnerabilities have been found in ClamAV:
A remote attacker could entice a user or automated system to process a specially crafted UPack archive or a file containing a specially crafted URL, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application, or a Denial of Service. Furthermore, a remote attacker could cause a Denial of Service by supplying a specially crafted TAR archive or PE executable to a Clam AntiVirus instance.
There is no known workaround at this time.
All Clam AntiVirus users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.95.2"