Lucene search

K
ubuntuUbuntuUSN-5423-1
HistoryMay 17, 2022 - 12:00 a.m.

ClamAV vulnerabilities

2022-05-1700:00:00
ubuntu.com
48

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.017 Low

EPSS

Percentile

87.7%

Releases

  • Ubuntu 22.04 LTS
  • Ubuntu 21.10
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM

Packages

  • clamav - Anti-virus utility for Unix

Details

Michał Dardas discovered that ClamAV incorrectly handled parsing CHM files.
A remote attacker could possibly use this issue to cause ClamAV to stop
responding, resulting in a denial of service. (CVE-2022-20770)

Michał Dardas discovered that ClamAV incorrectly handled parsing TIFF
files. A remote attacker could possibly use this issue to cause ClamAV to
stop responding, resulting in a denial of service. (CVE-2022-20771)

Michał Dardas discovered that ClamAV incorrectly handled parsing HTML
files. A remote attacker could possibly use this issue to cause ClamAV to
consume resources, resulting in a denial of service. (CVE-2022-20785)

Michał Dardas discovered that ClamAV incorrectly handled loading the
signature database. A remote attacker could possibly use this issue to
cause ClamAV to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2022-20792)

Alexander Patrakov and Antoine Gatineau discovered that ClamAV incorrectly
handled the scan verdict cache check. A remote attacker could possibly use
this issue to cause ClamAV to crash, resulting in a denial of service, or
possibly execute arbitrary code.(CVE-2022-20796)

OSVersionArchitecturePackageVersionFilename
Ubuntu22.04noarchclamav< 0.103.6+dfsg-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchclamav-base< 0.103.6+dfsg-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchclamav-daemon< 0.103.6+dfsg-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchclamav-daemon-dbgsym< 0.103.6+dfsg-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchclamav-dbgsym< 0.103.6+dfsg-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchclamav-docs< 0.103.6+dfsg-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchclamav-freshclam< 0.103.6+dfsg-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchclamav-freshclam-dbgsym< 0.103.6+dfsg-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchclamav-milter< 0.103.6+dfsg-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchclamav-milter-dbgsym< 0.103.6+dfsg-0ubuntu0.22.04.1UNKNOWN
Rows per page:
1-10 of 641

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.017 Low

EPSS

Percentile

87.7%