First published: Thu Apr 08 2021(Updated: )
A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Clamav Clamav | =0.103.0 | |
Clamav Clamav | =0.103.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this ClamAV vulnerability is CVE-2021-1404.
The affected software for CVE-2021-1404 is ClamAV Software versions 0.103.0 and 0.103.1.
The severity level of CVE-2021-1404 is high with a CVSS score of 7.5.
An unauthenticated, remote attacker can exploit CVE-2021-1404 by causing a denial of service condition on an affected device.
Yes, a security patch is available. Please refer to the official ClamAV blog post for more details and instructions.