clamav-milter in ClamAV before 0.91.2, when run in black hole mode, allows remote attackers to execute arbitrary commands via shell metacharacters that are used in a certain popen call, involving the "recipient field of sendmail."
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00104.html
http://www.vupen.com/english/advisories/2008/0924/references
http://www.trustix.org/errata/2007/0026/
http://www.securitytracker.com/id?1018610
http://www.securityfocus.com/bid/25439
http://www.securityfocus.com/archive/1/477723/100/0/threaded
http://www.nruns.com/security_advisory_clamav_remote_code_exection.php
http://www.novell.com/linux/security/advisories/2007_18_sr.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:172
http://www.debian.org/security/2007/dsa-1366
http://securityreason.com/securityalert/3063
http://security.gentoo.org/glsa/glsa-200709-14.xml
http://secunia.com/advisories/29420
http://secunia.com/advisories/26916
http://secunia.com/advisories/26822
http://secunia.com/advisories/26751
http://secunia.com/advisories/26683
http://secunia.com/advisories/26674
http://secunia.com/advisories/26654
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html