Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the clamav package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory SUSE-SA:2006:078 (clamav).
The anti virus scan engine ClamAV has been updated to version 0.88.7
to fix various security problems:
CVE-2006-5874: Clam AntiVirus (ClamAV) permits remote attackers to
cause a denial of service (crash) via a malformed base64-encoded MIME
attachment that triggers a null pointer dereference.
CVE-2006-6481: Clam AntiVirus (ClamAV) 0.88.6 permited remote attackers
to cause a denial of service (stack overflow and application crash)
by wrapping many layers of multipart/mixed content around a document,
a different vulnerability than CVE-2006-5874 and CVE-2006-6406.
CVE-2006-6406: Clam AntiVirus (ClamAV) 0.88.6 permited remote attackers
to bypass virus detection by inserting invalid characters into base64
encoded content in a multipart/mixed MIME file, as demonstrated with
the EICAR test file.
Solution : http://www.suse.de/security/http://www.novell.com/linux/security/advisories/2006_78_clamav.html
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security
No Discussions have been posted on this vulnerability.