First published: Wed May 04 2022(Updated: )
On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Clamav Clamav | <=0.103.5 | |
Clamav Clamav | >=0.104.0<=0.104.2 | |
Cisco Secure Endpoint | <1.16.3 | |
Cisco Secure Endpoint | <1.17.2 | |
Cisco Secure Endpoint | <7.5.5 | |
Cisco Secure Endpoint | >=1.18.0<1.18.2 | |
Cisco Secure Endpoint | >=1.18.0<1.18.2 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20770 is a vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier.
CVE-2022-20770 has a severity rating of 7.5, which is considered high.
CVE-2022-20770 affects ClamAV versions 0.103.5 and earlier, as well as versions 0.104.0 through 0.104.2. It also affects the LTS version 0.103.5. Additionally, certain versions of Cisco Secure Endpoint, Fedora, and Debian Linux are affected.
To fix CVE-2022-20770, users should update to ClamAV versions 0.103.6 or later, or 0.104.3 or later. For affected versions of Cisco Secure Endpoint, Fedora, and Debian Linux, users should follow the recommendations provided by the respective vendors.
You can find more information about CVE-2022-20770 in the references provided: [link1](https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html), [link2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/), [link3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/)