CVE-2020-3123

HIGH

ClamAV <0.102.1-0.102.0 - DoS

Title source: llm
STIX 2.1

Description

A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.

References (5)

Core 5
Core References
Third Party Advisory vendor-advisory x_refsource_cisco
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs59062
Release Notes, Vendor Advisory x_refsource_confirm
https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/4280-1/
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/4280-2/
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202003-46

Scores

CVSS v3 7.5
EPSS 0.0240
EPSS Percentile 85.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-125
Status published
Products (7)
canonical/ubuntu_linux 12.04
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 19.10
clamav/clamav 0.102.0
clamav/clamav 0.102.1
Published Feb 05, 2020
Tracked Since Feb 18, 2026