First published: Mon Apr 08 2019(Updated: )
A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Clamav Clamav | <=0.101.1 | |
Debian Debian Linux | =8.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =42.3 | |
<=0.101.1 | ||
=8.0 | ||
=15.0 | ||
=42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1787 is a vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior.
CVE-2019-1787 has a severity level of high.
CVE-2019-1787 can allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior are affected by CVE-2019-1787.
Update Clam AntiVirus (ClamAV) Software to version 0.101.2 or later to fix CVE-2019-1787.