Lucene search

K
nvd[email protected]NVD:CVE-2022-20770
HistoryMay 04, 2022 - 5:15 p.m.

CVE-2022-20770

2022-05-0417:15:08
CWE-399
web.nvd.nist.gov
7
clamav
vulnerability
chm file parser
denial of service
remote attacker

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.016

Percentile

87.6%

On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.

Affected configurations

Nvd
Node
clamavclamavRange0.103.5lts
OR
clamavclamavRange0.104.00.104.2
Node
ciscosecure_endpointRange<1.16.3macos
OR
ciscosecure_endpointRange<1.17.2linux
OR
ciscosecure_endpointRange<7.5.5windows
OR
ciscosecure_endpointRange1.18.01.18.2linux
OR
ciscosecure_endpointRange1.18.01.18.2macos
Node
fedoraprojectfedoraMatch34
OR
fedoraprojectfedoraMatch35
OR
fedoraprojectfedoraMatch36
Node
debiandebian_linuxMatch9.0
VendorProductVersionCPE
clamavclamav*cpe:2.3:a:clamav:clamav:*:*:*:*:lts:*:*:*
clamavclamav*cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
ciscosecure_endpoint*cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*
ciscosecure_endpoint*cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*
ciscosecure_endpoint*cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*
fedoraprojectfedora34cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
fedoraprojectfedora35cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
fedoraprojectfedora36cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
debiandebian_linux9.0cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.016

Percentile

87.6%