First published: Wed Aug 16 2023(Updated: )
A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.This vulnerability is due to an incorrect check for completion when a
Affected Software | Affected Version | How to fix |
---|---|---|
ClamAV |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-clamav-rNwNEEee is classified as high due to the potential for denial of service attacks.
To fix cisco-sa-clamav-rNwNEEee, upgrade to the patched version of ClamAV as recommended in the Cisco advisory.
Devices running vulnerable versions of Cisco ClamAV are affected by cisco-sa-clamav-rNwNEEee.
Yes, cisco-sa-clamav-rNwNEEee can be exploited remotely by an unauthenticated attacker.
The impact of cisco-sa-clamav-rNwNEEee is a denial of service condition that can disrupt the normal operation of affected devices.