The remote host is running ClamAV, an open-source antivirus solution for Unix-like systems. This version of ClamAV is reported to be vulnerable to a flaw where the parsing of a malicious file will cause the clamav process to overflow system memory, possibly resulting in an attacker executing code. An attacker exploiting this flaw would need to be able to send a specially formed email to the system running ClamAV. In addition, this version of ClamAV is vulnerable to a remote Denial of Service (DoS) attack that would render the service unavailable to valid users.
Binary data 3229.prm