ArchLinux: 201502-6: clamav: arbitrary code execution
Summary
Sebastian Andrzej Siewior discovered that ClamAV incorrectly handled certain upack packer files. An attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service, or possibly execute arbitrary code.
Resolution
Upgrade to 0.98.6-1.
# pacman -Syu "clamav>=0.98.6-1"
The problems have been fixed upstream in version 0.98.6.
References
https://lists.clamav.net/pipermail/clamav-announce/2015/000010.html https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9328
Workaround
None.