First published: Fri Jan 26 2018(Updated: )
ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =7.0 | |
Clamav Clamav | <=0.99.2 | |
debian/clamav | 0.103.10+dfsg-0+deb11u1 1.0.5+dfsg-1~deb12u1 1.4.1+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this ClamAV vulnerability is CVE-2017-12378.
The severity of CVE-2017-12378 is high with a severity value of 5.5.
The affected software for CVE-2017-12378 is ClamAV AntiVirus software versions 0.99.2 and prior.
An unauthenticated, remote attacker can exploit this vulnerability by sending a specially crafted .tar file to an affected device.
Yes, there are several remedies available to fix this vulnerability, including upgrading to ClamAV version 0.103.6+dfsg-0+deb10u1 or higher, or version 0.99.3 or higher.