A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 18.04 | |
ubuntu_linux | eq | 14.04 | |
ubuntu_linux | eq | 19.10 | |
ubuntu_linux | eq | 20.04 | |
ubuntu_linux | eq | 16.04 | |
ubuntu_linux | eq | 12.04 | |
clam_antivirus | le | 0.102.2 | |
debian_linux | eq | 8.0 | |
debian_linux | eq | 9.0 | |
fedora | eq | 30 |
blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
lists.debian.org/debian-lts-announce/2020/05/msg00018.html
lists.debian.org/debian-lts-announce/2020/08/msg00010.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ67VH37NCG25PICGWFWZHSVG7PBT7MC/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK/
security.gentoo.org/glsa/202007-23
usn.ubuntu.com/4370-1/
usn.ubuntu.com/4370-2/
usn.ubuntu.com/4435-1/
usn.ubuntu.com/4435-2/