First published: Wed May 04 2022(Updated: )
On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in the TIFF file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-ZAZBwRVG
Credit: Michal Dardas.
Affected Software | Affected Version | How to fix |
---|---|---|
ClamAV | >=0.104.0<0.104.2<=0.103.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-clamav-dos-ZAZBwRVG is characterized as a denial-of-service vulnerability which can lead to potential service interruption.
To fix cisco-sa-clamav-dos-ZAZBwRVG, update ClamAV to version 0.104.3 or later to mitigate the vulnerability.
ClamAV versions 0.104.0 through 0.104.2 and 0.103.5 and earlier are affected by cisco-sa-clamav-dos-ZAZBwRVG.
cisco-sa-clamav-dos-ZAZBwRVG is a vulnerability in the TIFF file parser within the ClamAV scanning library causing potential denial of service.
There are no specific workarounds for cisco-sa-clamav-dos-ZAZBwRVG; upgrading to a fixed version is recommended.