First published: Thu May 21 2020(Updated: )
It was discovered that ClamAV incorrectly handled parsing ARJ archives. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service. (CVE-2020-3327) It was discovered that ClamAV incorrectly handled parsing PDF files. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service. (CVE-2020-3341)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/clamav | <0.102.3+dfsg-0ubuntu0.20.04.1 | 0.102.3+dfsg-0ubuntu0.20.04.1 |
Ubuntu Linux | =20.04 | |
All of | ||
ubuntu/clamav | <0.102.3+dfsg-0ubuntu0.19.10.1 | 0.102.3+dfsg-0ubuntu0.19.10.1 |
Ubuntu Linux | =19.10 | |
All of | ||
ubuntu/clamav | <0.102.3+dfsg-0ubuntu0.18.04.1 | 0.102.3+dfsg-0ubuntu0.18.04.1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/clamav | <0.102.3+dfsg-0ubuntu0.16.04.1 | 0.102.3+dfsg-0ubuntu0.16.04.1 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is USN-4370-1.
ClamAV is affected by this vulnerability.
The severity of the ClamAV vulnerability (CVE-2020-3327) is not specified in the advisory.
To fix the ClamAV vulnerability (CVE-2020-3327), update ClamAV to version 0.102.3+dfsg-0ubuntu0.20.04.1 or later.
You can find more information about this ClamAV vulnerability in the Ubuntu Security Notices USN-4370-1 advisory.