First published: Fri Oct 16 2020(Updated: )
An issue was discovered in ClamXAV 3 before 3.1.1. A malicious actor could use a properly signed copy of ClamXAV 2 (running with an injected malicious dylib) to communicate with ClamXAV 3's helper tool and perform privileged operations. This occurs because of inadequate client verification in the helper tool.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ClamXAV | >=3.0.0<3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26893 has a high severity rating due to its potential for privilege escalation.
To resolve CVE-2020-26893, upgrade to ClamXAV version 3.1.1 or later.
CVE-2020-26893 exploits inadequate client verification in ClamXAV's helper tool.
CVE-2020-26893 affects ClamXAV versions prior to 3.1.1.
Yes, CVE-2020-26893 can potentially be exploited remotely by a malicious actor.