First published: Mon Jul 20 2020(Updated: )
A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
Credit: ykramarz@cisco.com psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/clamav | 0.103.10+dfsg-0+deb11u1 1.0.7+dfsg-1~deb11u2 1.0.7+dfsg-1~deb12u1 1.4.2+dfsg-1 | |
ClamAV | >=0.102.0<=0.102.3 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
Debian | =9.0 | |
Fedora | =31 | |
Fedora | =32 |
Upgrade to ClamAV version 0.102.4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3481 is a vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3.
CVE-2020-3481 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.
CVE-2020-3481 has a severity value of 7.5 (High).
To fix the CVE-2020-3481 vulnerability, update the Clam AntiVirus (ClamAV) Software to versions 0.103.6+dfsg-0+deb10u1, 0.103.9+dfsg-0+deb10u1, 0.103.10+dfsg-0+deb11u1, 1.0.3+dfsg-1~deb12u1, or 1.0.3+dfsg-2.
You can find more information about CVE-2020-3481 at the following references: [CVE-2020-3481](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3481), [ClamAV Blog](https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html), [Ubuntu Security Notice USN-4435-1](https://ubuntu.com/security/notices/USN-4435-1).