First published: Mon Apr 08 2019(Updated: )
A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Clamav Clamav | =0.101.0 | |
Clamav Clamav | =0.101.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1785 is a vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0.
CVE-2019-1785 has a severity rating of 7.8, which is considered critical.
An unauthenticated, remote attacker can exploit CVE-2019-1785 to cause a denial of service condition on an affected device.
Yes, there are fixes available for CVE-2019-1785. It is recommended to update to Clam AntiVirus (ClamAV) Software versions 0.101.2 or later to mitigate the vulnerability.
You can find more information about CVE-2019-1785 on the ClamAV bugzilla and the Gentoo security advisory pages.