Description
ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap-based buffer over-read condition in mew.c when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device.
References (5)
Core 5
Core References
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3550-1/
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3550-2/
Exploit, Issue Tracking, Vendor Advisory x_refsource_confirm
https://bugzilla.clamav.net/show_bug.cgi?id=11943
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
Release Notes, Vendor Advisory x_refsource_confirm
http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
Scores
CVSS v3
9.8
EPSS
0.2136
EPSS Percentile
95.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-125
Status
published
Products (2)
clamav/clamav
< 0.99.2
debian/debian_linux
7.0
Published
Jan 26, 2018
Tracked Since
Feb 18, 2026