Lucene search

K
ubuntuUbuntuUSN-5423-2
HistoryMay 17, 2022 - 12:00 a.m.

ClamAV vulnerabilities

2022-05-1700:00:00
ubuntu.com
35

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8 High

AI Score

Confidence

High

0.017 Low

EPSS

Percentile

87.7%

Releases

  • Ubuntu 16.04 ESM
  • Ubuntu 14.04 ESM

Packages

  • clamav - Anti-virus utility for Unix

Details

USN-5423-1 fixed several vulnerabilities in ClamAV. This update provides
the corresponding update for Ubuntu 14.04 ESM and 16.04 ESM.

Original advisory details:

Michaล‚ Dardas discovered that ClamAV incorrectly handled parsing CHM files.
A remote attacker could possibly use this issue to cause ClamAV to stop
responding, resulting in a denial of service. (CVE-2022-20770)

Michaล‚ Dardas discovered that ClamAV incorrectly handled parsing TIFF
files. A remote attacker could possibly use this issue to cause ClamAV to
stop responding, resulting in a denial of service. (CVE-2022-20771)

Michaล‚ Dardas discovered that ClamAV incorrectly handled parsing HTML
files. A remote attacker could possibly use this issue to cause ClamAV to
consume resources, resulting in a denial of service. (CVE-2022-20785)

Michaล‚ Dardas discovered that ClamAV incorrectly handled loading the
signature database. A remote attacker could possibly use this issue to
cause ClamAV to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2022-20792)

Alexander Patrakov and Antoine Gatineau discovered that ClamAV incorrectly
handled the scan verdict cache check. A remote attacker could possibly use
this issue to cause ClamAV to crash, resulting in a denial of service, or
possibly execute arbitrary code.(CVE-2022-20796)

OSVersionArchitecturePackageVersionFilename
Ubuntu16.04noarchclamav<ย 0.103.6+dfsg-0ubuntu0.16.04.1+esm1UNKNOWN
Ubuntu16.04noarchclamav<ย 0.103.2+dfsg-0ubuntu0.16.04.1UNKNOWN
Ubuntu16.04noarchclamav-base<ย 0.103.2+dfsg-0ubuntu0.16.04.1UNKNOWN
Ubuntu16.04noarchclamav-daemon<ย 0.103.2+dfsg-0ubuntu0.16.04.1UNKNOWN
Ubuntu16.04noarchclamav-daemon-dbgsym<ย 0.103.2+dfsg-0ubuntu0.16.04.1UNKNOWN
Ubuntu16.04noarchclamav-dbg<ย 0.103.2+dfsg-0ubuntu0.16.04.1UNKNOWN
Ubuntu16.04noarchclamav-dbgsym<ย 0.103.2+dfsg-0ubuntu0.16.04.1UNKNOWN
Ubuntu16.04noarchclamav-docs<ย 0.103.2+dfsg-0ubuntu0.16.04.1UNKNOWN
Ubuntu16.04noarchclamav-freshclam<ย 0.103.2+dfsg-0ubuntu0.16.04.1UNKNOWN
Ubuntu16.04noarchclamav-freshclam-dbgsym<ย 0.103.2+dfsg-0ubuntu0.16.04.1UNKNOWN
Rows per page:
1-10 of 331

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8 High

AI Score

Confidence

High

0.017 Low

EPSS

Percentile

87.7%