First published: Wed Feb 07 2024(Updated: )
A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources. For a description of this vulnerability, see the ClamAV blog .
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/clamav | <1.0.5+dfsg-0ubuntu0.23.10.1 | 1.0.5+dfsg-0ubuntu0.23.10.1 |
ubuntu/clamav | <1.0.5+dfsg-1ubuntu1 | 1.0.5+dfsg-1ubuntu1 |
debian/clamav | <=1.0.3+dfsg-1~deb12u1 | 0.103.6+dfsg-0+deb10u1 0.103.9+dfsg-0+deb10u1 0.103.10+dfsg-0+deb11u1 1.0.6+dfsg-1 |
Cisco Secure Endpoint | <7.5.17 | |
Cisco Secure Endpoint | >=8.0.1.21160<8.2.3.30119 | |
Cisco Secure Endpoint | <3.8.0 | |
Fedora | =38 | |
Fedora | =39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-20290 has a severity rating that indicates it could lead to a denial of service condition.
To fix CVE-2024-20290, upgrade ClamAV to the patched versions: 1.0.5+dfsg-0ubuntu0.23.10.1 or 1.0.5+dfsg-1ubuntu1 for Ubuntu, or the appropriate updates provided by Debian and Cisco.
CVE-2024-20290 affects multiple versions of ClamAV across Ubuntu, Debian, and Cisco Secure Endpoint installations.
Yes, CVE-2024-20290 can be exploited by an unauthenticated remote attacker.
CVE-2024-20290 is categorized as a denial of service vulnerability due to a flaw in the OLE2 file format parser in ClamAV.