CVE-2017-12378

MEDIUM

ClamAV AntiVirus <0.99.2 - DoS

Title source: llm
STIX 2.1

Description

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device.

References (5)

Core 5
Core References
Vendor Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3550-1/
Vendor Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3550-2/
Exploit, Issue Tracking, Patch, Vendor Advisory x_refsource_confirm
https://bugzilla.clamav.net/show_bug.cgi?id=11946
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
Release Notes, Vendor Advisory x_refsource_confirm
http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html

Scores

CVSS v3 5.5
EPSS 0.0771
EPSS Percentile 92.0%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-125
Status published
Products (2)
clamav/clamav < 0.99.2
debian/debian_linux 7.0
Published Jan 26, 2018
Tracked Since Feb 18, 2026