Description
ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device.
References (5)
Core 5
Core References
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3550-1/
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3550-2/
Exploit, Issue Tracking, Patch, Vendor Advisory x_refsource_confirm
https://bugzilla.clamav.net/show_bug.cgi?id=11946
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html
Release Notes, Vendor Advisory x_refsource_confirm
http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html
Scores
CVSS v3
5.5
EPSS
0.0771
EPSS Percentile
92.0%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (2)
clamav/clamav
< 0.99.2
debian/debian_linux
7.0
Published
Jan 26, 2018
Tracked Since
Feb 18, 2026