CVE-2017-12377

CRITICAL

ClamAV AntiVirus <0.99.2 - DoS

Title source: llm
STIX 2.1

Description

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap-based buffer over-read condition in mew.c when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device.

References (5)

Core 5
Core References
Vendor Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3550-1/
Vendor Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3550-2/
Exploit, Issue Tracking, Vendor Advisory x_refsource_confirm
https://bugzilla.clamav.net/show_bug.cgi?id=11943
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
Release Notes, Vendor Advisory x_refsource_confirm
http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html

Scores

CVSS v3 9.8
EPSS 0.2136
EPSS Percentile 95.7%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-125
Status published
Products (2)
clamav/clamav < 0.99.2
debian/debian_linux 7.0
Published Jan 26, 2018
Tracked Since Feb 18, 2026