First published: Wed May 04 2022(Updated: )
On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-prVGcHLd
Credit: Michal Dardas.
Affected Software | Affected Version | How to fix |
---|---|---|
ClamAV | >=0.104.0<0.104.2<=0.103.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-clamav-dos-prVGcHLd has been classified as high.
To fix cisco-sa-clamav-dos-prVGcHLd, update ClamAV to version 0.104.3 or later and LTS version 0.103.6 or later.
ClamAV versions 0.104.0 through 0.104.2 and 0.103.5 and earlier are affected by cisco-sa-clamav-dos-prVGcHLd.
cisco-sa-clamav-dos-prVGcHLd describes a denial of service vulnerability in the CHM file parser of ClamAV.
cisco-sa-clamav-dos-prVGcHLd was disclosed on May 4, 2022.