First published: Fri Feb 17 2023(Updated: )
A vulnerability in the OLE2 file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.The vulnerability is due to incorrect use of the realloc function that may result in a double-free. An attacker could exploit this vulnerability by submitting a crafted OLE2 file to be scanned by ClamAV on the affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
ClamAV | >=0.104.0<0.104.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-20803 is high with a CVSS score of 7.5.
The affected software for CVE-2022-20803 is Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2.
CVE-2022-20803 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.
To fix CVE-2022-20803, it is recommended to update Clam AntiVirus (ClamAV) to version 0.104.3 or higher.
The Common Weakness Enumeration (CWE) ID for CVE-2022-20803 is 415.