Lucene search

K
ciscoCiscoCISCO-SA-CLAMAV-DOS-FTKHQMWZ
HistoryAug 16, 2023 - 4:00 p.m.

ClamAV AutoIt Module Denial of Service Vulnerability

2023-08-1616:00:00
tools.cisco.com
11
clamav
autoit
dos
vulnerability
cisco
software
logic error
memory management
crafted file
scanning process

0.001 Low

EPSS

Percentile

26.8%

A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

For a description of this vulnerability, see the ClamAV blog [“https://blog.clamav.net/2023/07/2023-08-16-releases.html”].

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ”]

Affected configurations

Vulners
Node
ciscosecure_endpointMatchanymacos
OR
ciscosecure_endpointMatchanymacos

0.001 Low

EPSS

Percentile

26.8%