Lucene search

K
freebsdFreeBSD996518F3-6EF9-11EF-B01B-08002784C58D
HistorySep 04, 2024 - 12:00 a.m.

clamav -- Multiple vulnerabilities

2024-09-0400:00:00
vuxml.freebsd.org
4
clamav
vulnerabilities
denial of service
pdf parsing
clamd service
system file corruption

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

17.7%

The ClamAV project reports:

CVE-2024-20505

      A vulnerability in the PDF parsing module of Clam
      AntiVirus (ClamAV) could allow an unauthenticated,
      remote attacker to cause a denial of service (DoS)
      condition on an affected device. The vulnerability is
      due to an out of bounds read. An attacker could exploit
      this vulnerability by submitting a crafted PDF file to
      be scanned by ClamAV on an affected device. An exploit
      could allow the attacker to terminate the scanning
      process.

CVE-2024-20506

      A vulnerability in the ClamD service module of Clam
      AntiVirus (ClamAV) could allow an authenticated, local
      attacker to corrupt critical system files. The
      vulnerability is due to allowing the ClamD process to
      write to its log file while privileged without checking
      if the logfile has been replaced with a symbolic
      link. An attacker could exploit this vulnerability if
      they replace the ClamD log file with a symlink to a
      critical system file and then find a way to restart the
      ClamD process. An exploit could allow the attacker to
      corrupt a critical system file by appending ClamD log
      messages after restart.
OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchclamav= 1.3.0,1UNKNOWN
FreeBSDanynoarchclamav< 1.3.2,1UNKNOWN
FreeBSDanynoarchclamav-lts= 1.0.0,1UNKNOWN
FreeBSDanynoarchclamav-lts< 1.0.6,1UNKNOWN

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

17.7%