Lucene search

K
cve[email protected]CVE-2022-20770
HistoryMay 04, 2022 - 5:15 p.m.

CVE-2022-20770

2022-05-0417:15:08
CWE-399
web.nvd.nist.gov
166
4
cve
2022
20770
vulnerability
clamav
library
chm
file parser
denial of service

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.011 Low

EPSS

Percentile

84.9%

On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.

Affected configurations

NVD
Node
clamavclamavRange0.103.5lts
OR
clamavclamavRange0.104.00.104.2
Node
ciscosecure_endpointRange<1.16.3macos
OR
ciscosecure_endpointRange<1.17.2linux
OR
ciscosecure_endpointRange<7.5.5windows
OR
ciscosecure_endpointRange1.18.01.18.2linux
OR
ciscosecure_endpointRange1.18.01.18.2macos
Node
fedoraprojectfedoraMatch34
OR
fedoraprojectfedoraMatch35
OR
fedoraprojectfedoraMatch36
Node
debiandebian_linuxMatch9.0

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco AMP for Endpoints ",
    "versions": [
      {
        "version": "n/a",
        "status": "affected"
      }
    ]
  }
]

Social References

More

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.011 Low

EPSS

Percentile

84.9%