First published: Thu Apr 08 2021(Updated: )
A vulnerability in the Excel XLM macro parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper error handling that may result in an infinite loop. An attacker could exploit this vulnerability by sending a crafted Excel file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process hang, resulting in a denial of service condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Clamav Clamav | =0.103.0 | |
Clamav Clamav | =0.103.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1252 is a vulnerability in the Excel XLM macro parsing module in Clam AntiVirus (ClamAV) software versions 0.103.0 and 0.103.1.
CVE-2021-1252 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.
CVE-2021-1252 has a severity rating of 7.5 (High).
To mitigate the risk of CVE-2021-1252, it is recommended to update to ClamAV software version 0.103.2 or later.
You can find more information about CVE-2021-1252 in the ClamAV blog post at https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html.