Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-20328
HistoryFeb 09, 2024 - 12:00 a.m.

CVE-2024-20328

2024-02-0900:00:00
ubuntu.com
ubuntu.com
44
clamav
virusevent
vulnerability
local attacker
arbitrary commands
file names
software updates

CVSS3

5.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

AI Score

6

Confidence

High

EPSS

0

Percentile

9.6%

A vulnerability in the VirusEvent feature of ClamAV could allow a local
attacker to inject arbitrary commands with the privileges of the
application service account.The vulnerability is due to unsafe handling of
file names. A local attacker could exploit this vulnerability by supplying
a file name containing command-line sequences. When processed on a system
using configuration options for the VirusEvent feature, the attacker could
cause the application to execute arbitrary commands. ClamAV has released
software updates that address this vulnerability. There are no workarounds
that address this vulnerability.

Bugs

Notes

Author Note
mdeslaur doesn’t appear to affect 0.103.x
OSVersionArchitecturePackageVersionFilename
ubuntu23.10noarchclamav< 1.0.5+dfsg-0ubuntu0.23.10.1UNKNOWN
ubuntu24.04noarchclamav< 1.0.5+dfsg-1ubuntu1UNKNOWN

CVSS3

5.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

AI Score

6

Confidence

High

EPSS

0

Percentile

9.6%