Lucene search

K
cvelistCiscoCVELIST:CVE-2024-20290
HistoryFeb 07, 2024 - 4:16 p.m.

CVE-2024-20290

2024-02-0716:16:00
cisco
www.cve.org
2
clamav
ole2
file parser
vulnerability
denial of service
crafting file
heap buffer over-read
scanning
dos condition
system resources

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

36.1%

A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources.

For a description of this vulnerability, see the ClamAV blog .

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Secure Endpoint",
    "versions": [
      {
        "version": "6.0.9",
        "status": "affected"
      },
      {
        "version": "6.0.7",
        "status": "affected"
      },
      {
        "version": "6.1.5",
        "status": "affected"
      },
      {
        "version": "6.1.7",
        "status": "affected"
      },
      {
        "version": "6.1.9",
        "status": "affected"
      },
      {
        "version": "6.2.1",
        "status": "affected"
      },
      {
        "version": "6.2.5",
        "status": "affected"
      },
      {
        "version": "6.2.19",
        "status": "affected"
      },
      {
        "version": "6.2.3",
        "status": "affected"
      },
      {
        "version": "6.2.9",
        "status": "affected"
      },
      {
        "version": "6.3.5",
        "status": "affected"
      },
      {
        "version": "6.3.1",
        "status": "affected"
      },
      {
        "version": "6.3.7",
        "status": "affected"
      },
      {
        "version": "6.3.3",
        "status": "affected"
      },
      {
        "version": "7.0.5",
        "status": "affected"
      },
      {
        "version": "7.1.1",
        "status": "affected"
      },
      {
        "version": "7.1.5",
        "status": "affected"
      },
      {
        "version": "7.2.13",
        "status": "affected"
      },
      {
        "version": "7.2.7",
        "status": "affected"
      },
      {
        "version": "7.2.3",
        "status": "affected"
      },
      {
        "version": "7.2.11",
        "status": "affected"
      },
      {
        "version": "7.2.5",
        "status": "affected"
      },
      {
        "version": "7.3.1",
        "status": "affected"
      },
      {
        "version": "7.3.9",
        "status": "affected"
      },
      {
        "version": "7.3.3",
        "status": "affected"
      },
      {
        "version": "7.3.5",
        "status": "affected"
      },
      {
        "version": "8.1.7",
        "status": "affected"
      },
      {
        "version": "8.1.5",
        "status": "affected"
      },
      {
        "version": "8.1.3.21242",
        "status": "affected"
      },
      {
        "version": "8.1.7.21512",
        "status": "affected"
      },
      {
        "version": "8.1.3",
        "status": "affected"
      },
      {
        "version": "8.1.5.21322",
        "status": "affected"
      },
      {
        "version": "8.1.7.21417",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Cisco",
    "product": "Cisco Secure Endpoint Private Cloud Administration Portal",
    "versions": [
      {
        "version": "N/A",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Cisco",
    "product": "Cisco Secure Endpoint Private Cloud Console",
    "versions": [
      {
        "version": "N/A",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

36.1%