CVE-2022-20698

HIGH

ClamAV <0.104.1-0.103.4 - DoS

Title source: llm
STIX 2.1

Description

A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 0.104.1 and LTS version 0.103.4 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper checks that may result in an invalid pointer read. An attacker could exploit this vulnerability by sending a crafted OOXML file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.

References (2)

Core 2
Core References
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202310-01

Scores

CVSS v3 7.5
EPSS 0.0024
EPSS Percentile 47.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-125 CWE-20
Status published
Products (11)
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 20.04
canonical/ubuntu_linux 20.10
canonical/ubuntu_linux 21.04
clamav/clamav < 0.103.5
clamav/clamav 0.104.0 - 0.104.2
debian/debian_linux 9.0
debian/debian_linux 10.0
... and 1 more
Published Jan 14, 2022
Tracked Since Feb 18, 2026