Several remote vulnerabilities have been discovered in the Clam anti-virus toolkit. The Common Vulnerabilities and Exposures project identifies the following problems:
It was discovered that the RTF and RFC2397 parsers can be tricked into dereferencing a NULL pointer, resulting in denial of service.
It was discovered that clamav-milter performs insufficient input sanitising, resulting in the execution of arbitrary shell commands.
The oldstable distribution (sarge) is only affected by a subset of the problems. An update will be provided later.
For the stable distribution (etch) these problems have been fixed in version 0.90.1-3etch7.
For the unstable distribution (sid) these problems have been fixed in version 0.91.2-1.
We recommend that you upgrade your clamav packages.