Debian Security Advisory DSA 1549-1 (clamav)

Summary
The remote host is missing an update to clamav announced via advisory DSA 1549-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201549-1
Insight
Several remote vulnerabilities have been discovered in the Clam anti-virus toolkit. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-0314 Damian Put discovered that a buffer overflow in the handler for PeSpin binaries may lead to the execution of arbitrary code. CVE-2008-1100 Alin Rad Pop discovered that a buffer overflow in the handler for Upack PE binaries may lead to the execution of arbitrary code. no CVE yet Damian Put and Thomas Pollet discovered that a buffer overflow in the handler for WWPack-compressed PE binaries may lead to the execution of arbitrary code. For the stable distribution (etch) these problems have been fixed in version 0.90.1-3etch11. For the unstable distribution (sid) these problems have been fixed in version 0.92.1~dfsg2-1 We recommend that you upgrade your clamav packages.