Description
A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 0.104.1 and LTS version 0.103.4 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper checks that may result in an invalid pointer read. An attacker could exploit this vulnerability by sending a crafted OOXML file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.
References (2)
Core 2
Core References
Exploit, Vendor Advisory vendor-advisory
https://blog.clamav.net/2022/01/clamav-01035-and-01042-security-patch.html
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202310-01
Scores
CVSS v3
7.5
EPSS
0.0024
EPSS Percentile
47.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-125
CWE-20
Status
published
Products (11)
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
20.04
canonical/ubuntu_linux
20.10
canonical/ubuntu_linux
21.04
clamav/clamav
< 0.103.5
clamav/clamav
0.104.0 - 0.104.2
debian/debian_linux
9.0
debian/debian_linux
10.0
... and 1 more
Published
Jan 14, 2022
Tracked Since
Feb 18, 2026