CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
35.9%
A vulnerability in the OLE2 file format parser of ClamAV could allow an
unauthenticated, remote attacker to cause a denial of service (DoS)
condition on an affected device. This vulnerability is due to an incorrect
check for end-of-string values during scanning, which may result in a heap
buffer over-read. An attacker could exploit this vulnerability by
submitting a crafted file containing OLE2 content to be scanned by ClamAV
on an affected device. A successful exploit could allow the attacker to
cause the ClamAV scanning process to terminate, resulting in a DoS
condition on the affected software and consuming available system
resources. For a description of this vulnerability, see the ClamAV blog .
Author | Note |
---|---|
mdeslaur | doesn’t appear to affect 0.103.x |
blog.clamav.net/2023/11/clamav-130-122-105-released.html
launchpad.net/bugs/cve/CVE-2024-20290
nvd.nist.gov/vuln/detail/CVE-2024-20290
sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-hDffu6t
security-tracker.debian.org/tracker/CVE-2024-20290
ubuntu.com/security/notices/USN-6636-1
www.cve.org/CVERecord?id=CVE-2024-20290
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
35.9%