Remote exploitation of an input validation error in Clam
	    AntiVirus ClamAV allows attackers to cause a denial of
	    service condition.
	  The vulnerability specifically exists due to insufficient
	    validation on cabinet file header data. The
	    ENSURE_BITS() macro fails to check for zero
	    length reads, allowing a carefully constructed cabinet
	    file to cause an infinite loop.
	  ClamAV is used in a number of mail gateway
	    products. Successful exploitation requires an attacker to
	    send a specially constructed CAB file through a mail
	    gateway or personal anti-virus client utilizing the ClamAV
	    scanning engine. The infinate loop will cause the ClamAV
	    software to use all available processor resources,
	    resulting in a denial of service or severe degradation to
	    system performance. Remote exploitation can be achieved by
	    sending a malicious file in an e-mail message or during an
	    HTTP session.