First published: Wed Feb 07 2024(Updated: )
A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources. For a description of this vulnerability, see the ClamAV blog .
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Endpoint | <7.5.17 | |
Cisco Secure Endpoint | >=8.0.1.21160<8.2.3.30119 | |
Cisco Secure Endpoint Private Cloud | <3.8.0 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
ubuntu/clamav | <1.0.5+dfsg-0ubuntu0.23.10.1 | 1.0.5+dfsg-0ubuntu0.23.10.1 |
ubuntu/clamav | <1.0.5+dfsg-1ubuntu1 | 1.0.5+dfsg-1ubuntu1 |
debian/clamav | <=1.0.3+dfsg-1~deb12u1 | 0.103.6+dfsg-0+deb10u1 0.103.9+dfsg-0+deb10u1 0.103.10+dfsg-0+deb11u1 1.0.6+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)