First published: Thu Apr 08 2021(Updated: )
A vulnerability in the email parsing module in Clam AntiVirus (ClamAV) Software version 0.103.1 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper variable initialization that may result in an NULL pointer read. An attacker could exploit this vulnerability by sending a crafted email to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Clamav Clamav | <=0.103.1 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-1405.
The severity of CVE-2021-1405 is high with a CVSS score of 7.5.
The affected software for CVE-2021-1405 is Clam AntiVirus (ClamAV) Software version 0.103.1 and all prior versions, as well as Debian Linux 9.0.
An unauthenticated, remote attacker can exploit CVE-2021-1405 by causing a denial of service condition on an affected device.
Yes, security patches and updates are available for CVE-2021-1405. Please refer to the vendor's official website or security advisories for more information.