Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-20328 (GCVE-0-2024-20328)
Vulnerability from cvelistv5 – Published: 2024-03-01 20:48 – Updated: 2025-11-04 18:22- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:cisco:clamav:1.2.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "clamav",
"vendor": "cisco",
"versions": [
{
"status": "affected",
"version": "1.2.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:cisco:clamav:1.2.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "clamav",
"vendor": "cisco",
"versions": [
{
"status": "affected",
"version": "1.2.1"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-20328",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-03-05T15:40:24.549668Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-23T20:45:50.903Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-04T18:22:37.791Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://blog.clamav.net/2023/11/clamav-130-122-105-released.html"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FXZYVDNV66RNMNVJOHAJAYRZV4U64CQ/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "ClamAV",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "1.2.0"
},
{
"status": "affected",
"version": "1.2.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands.\nClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\n\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-01T20:48:15.328Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"url": "https://blog.clamav.net/2023/11/clamav-130-122-105-released.html"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "ClamAV VirusEvent File Processing Command Injection Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2024-20328",
"datePublished": "2024-03-01T20:48:15.328Z",
"dateReserved": "2023-11-08T15:08:07.641Z",
"dateUpdated": "2025-11-04T18:22:37.791Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands.\\nClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\\n\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en la caracter\\u00edstica VirusEvent de ClamAV podr\\u00eda permitir a un atacante local inyectar comandos arbitrarios con los privilegios de la cuenta de servicio de la aplicaci\\u00f3n. La vulnerabilidad se debe al manejo inseguro de nombres de archivos. Un atacante local podr\\u00eda aprovechar esta vulnerabilidad proporcionando un nombre de archivo que contenga secuencias de l\\u00ednea de comandos. Cuando se procesa en un sistema usando opciones de configuraci\\u00f3n para la funci\\u00f3n VirusEvent, el atacante podr\\u00eda hacer que la aplicaci\\u00f3n ejecute comandos arbitrarios. ClamAV ha lanzado actualizaciones de software que abordan esta vulnerabilidad. No existen soluciones alternativas que aborden esta vulnerabilidad.\"}]",
"id": "CVE-2024-20328",
"lastModified": "2024-11-21T08:52:23.097",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.4}]}",
"published": "2024-03-01T21:15:07.790",
"references": "[{\"url\": \"https://blog.clamav.net/2023/11/clamav-130-122-105-released.html\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://blog.clamav.net/2023/11/clamav-130-122-105-released.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-78\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-20328\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2024-03-01T21:15:07.790\",\"lastModified\":\"2025-11-04T19:16:28.030\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands.\\nClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\\n\\n\\n\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la caracter\u00edstica VirusEvent de ClamAV podr\u00eda permitir a un atacante local inyectar comandos arbitrarios con los privilegios de la cuenta de servicio de la aplicaci\u00f3n. La vulnerabilidad se debe al manejo inseguro de nombres de archivos. Un atacante local podr\u00eda aprovechar esta vulnerabilidad proporcionando un nombre de archivo que contenga secuencias de l\u00ednea de comandos. Cuando se procesa en un sistema usando opciones de configuraci\u00f3n para la funci\u00f3n VirusEvent, el atacante podr\u00eda hacer que la aplicaci\u00f3n ejecute comandos arbitrarios. ClamAV ha lanzado actualizaciones de software que abordan esta vulnerabilidad. No existen soluciones alternativas que aborden esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":3.4}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.0\",\"versionEndExcluding\":\"1.0.5\",\"matchCriteriaId\":\"B7B435D2-E87C-4EF6-B883-3C12ED264AC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.2.0\",\"versionEndExcluding\":\"1.2.2\",\"matchCriteriaId\":\"C3ADA2E9-3E02-4352-8D68-A198DC490AA4\"}]}]}],\"references\":[{\"url\":\"https://blog.clamav.net/2023/11/clamav-130-122-105-released.html\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://blog.clamav.net/2023/11/clamav-130-122-105-released.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FXZYVDNV66RNMNVJOHAJAYRZV4U64CQ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://blog.clamav.net/2023/11/clamav-130-122-105-released.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T21:59:41.779Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-20328\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-05T15:40:24.549668Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:cisco:clamav:1.2.0:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"clamav\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.2.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:clamav:1.2.1:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"clamav\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.2.1\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-18T15:12:15.902Z\"}}], \"cna\": {\"title\": \"ClamAV VirusEvent File Processing Command Injection Vulnerability\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"ClamAV\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.2.0\"}, {\"status\": \"affected\", \"version\": \"1.2.1\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://blog.clamav.net/2023/11/clamav-130-122-105-released.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands.\\nClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\\n\\n\\n\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-78\", \"description\": \"CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2024-03-01T20:48:15.328Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-20328\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T21:59:41.779Z\", \"dateReserved\": \"2023-11-08T15:08:07.641Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2024-03-01T20:48:15.328Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
cleanstart-2026-la13761
Vulnerability from cleanstart
Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "clamav"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-LA13761",
"modified": "2026-01-29T18:58:54Z",
"published": "2026-01-30T14:05:50.594365Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-LA13761"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20328"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20328"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device",
"upstream": [
"CVE-2017-11423",
"CVE-2017-12374",
"CVE-2017-12375",
"CVE-2017-12376",
"CVE-2017-12377",
"CVE-2017-12378",
"CVE-2017-12379",
"CVE-2017-12380",
"CVE-2017-16932",
"CVE-2017-6419",
"CVE-2018-0202",
"CVE-2018-0360",
"CVE-2018-0361",
"CVE-2018-1000085",
"CVE-2018-14680",
"CVE-2018-14681",
"CVE-2018-14682",
"CVE-2019-12625",
"CVE-2019-15961",
"CVE-2019-1787",
"CVE-2019-1788",
"CVE-2019-1789",
"CVE-2020-3123",
"CVE-2020-3327",
"CVE-2020-3341",
"CVE-2020-3350",
"CVE-2020-3481",
"CVE-2021-1252",
"CVE-2021-1404",
"CVE-2021-1405",
"CVE-2022-20698",
"CVE-2022-48579",
"CVE-2023-20052",
"CVE-2023-20197",
"CVE-2024-20290",
"CVE-2024-20328"
]
}
cleanstart-2026-tc95380
Vulnerability from cleanstart
Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "clamav"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-TC95380",
"modified": "2026-02-03T13:35:45Z",
"published": "2026-02-06T01:06:01.062694Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-TC95380.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20328"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20328"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device",
"upstream": [
"CVE-2017-11423",
"CVE-2017-12374",
"CVE-2017-12375",
"CVE-2017-12376",
"CVE-2017-12377",
"CVE-2017-12378",
"CVE-2017-12379",
"CVE-2017-12380",
"CVE-2017-16932",
"CVE-2017-6419",
"CVE-2018-0202",
"CVE-2018-0360",
"CVE-2018-0361",
"CVE-2018-1000085",
"CVE-2018-14680",
"CVE-2018-14681",
"CVE-2018-14682",
"CVE-2019-12625",
"CVE-2019-15961",
"CVE-2019-1787",
"CVE-2019-1788",
"CVE-2019-1789",
"CVE-2020-3123",
"CVE-2020-3327",
"CVE-2020-3341",
"CVE-2020-3350",
"CVE-2020-3481",
"CVE-2021-1252",
"CVE-2021-1404",
"CVE-2021-1405",
"CVE-2022-20698",
"CVE-2022-48579",
"CVE-2023-20052",
"CVE-2023-20197",
"CVE-2024-20290",
"CVE-2024-20328"
]
}
cleanstart-2026-nj87139
Vulnerability from cleanstart
Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "clamav"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-NJ87139",
"modified": "2026-01-29T18:58:54Z",
"published": "2026-01-30T14:17:21.473350Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-NJ87139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20328"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20328"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device",
"upstream": [
"CVE-2017-11423",
"CVE-2017-12374",
"CVE-2017-12375",
"CVE-2017-12376",
"CVE-2017-12377",
"CVE-2017-12378",
"CVE-2017-12379",
"CVE-2017-12380",
"CVE-2017-16932",
"CVE-2017-6419",
"CVE-2018-0202",
"CVE-2018-0360",
"CVE-2018-0361",
"CVE-2018-1000085",
"CVE-2018-14680",
"CVE-2018-14681",
"CVE-2018-14682",
"CVE-2019-12625",
"CVE-2019-15961",
"CVE-2019-1787",
"CVE-2019-1788",
"CVE-2019-1789",
"CVE-2020-3123",
"CVE-2020-3327",
"CVE-2020-3341",
"CVE-2020-3350",
"CVE-2020-3481",
"CVE-2021-1252",
"CVE-2021-1404",
"CVE-2021-1405",
"CVE-2022-20698",
"CVE-2022-48579",
"CVE-2023-20052",
"CVE-2023-20197",
"CVE-2024-20290",
"CVE-2024-20328"
]
}
cleanstart-2026-wx01708
Vulnerability from cleanstart
Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "clamav"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.2-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the clamav package. A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-WX01708",
"modified": "2026-02-03T13:35:45Z",
"published": "2026-02-06T01:10:02.024980Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-WX01708.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-20328"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11423"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12374"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12375"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12376"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12377"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12378"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12379"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12380"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16932"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6419"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0202"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0360"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0361"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000085"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14680"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14681"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14682"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15961"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1787"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1788"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1789"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3123"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3327"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3341"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3350"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3481"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1252"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1404"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1405"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20698"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48579"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20052"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20197"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20290"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20328"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device",
"upstream": [
"CVE-2017-11423",
"CVE-2017-12374",
"CVE-2017-12375",
"CVE-2017-12376",
"CVE-2017-12377",
"CVE-2017-12378",
"CVE-2017-12379",
"CVE-2017-12380",
"CVE-2017-16932",
"CVE-2017-6419",
"CVE-2018-0202",
"CVE-2018-0360",
"CVE-2018-0361",
"CVE-2018-1000085",
"CVE-2018-14680",
"CVE-2018-14681",
"CVE-2018-14682",
"CVE-2019-12625",
"CVE-2019-15961",
"CVE-2019-1787",
"CVE-2019-1788",
"CVE-2019-1789",
"CVE-2020-3123",
"CVE-2020-3327",
"CVE-2020-3341",
"CVE-2020-3350",
"CVE-2020-3481",
"CVE-2021-1252",
"CVE-2021-1404",
"CVE-2021-1405",
"CVE-2022-20698",
"CVE-2022-48579",
"CVE-2023-20052",
"CVE-2023-20197",
"CVE-2024-20290",
"CVE-2024-20328"
]
}
CERTFR-2024-AVI-0104
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits ClamAV. Elles permettent à un attaquant de provoquer un déni de service et une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ClamAV versions ant\u00e9rieures \u00e0 1.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "ClamAV",
"scada": false
}
}
},
{
"description": "ClamAV 0.105 toutes versions (fin de vie)",
"product": {
"name": "N/A",
"vendor": {
"name": "ClamAV",
"scada": false
}
}
},
{
"description": "ClamAV 1.1 toutes versions (fin de vie)",
"product": {
"name": "N/A",
"vendor": {
"name": "ClamAV",
"scada": false
}
}
},
{
"description": "ClamAV versions ant\u00e9rieures \u00e0 1.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "ClamAV",
"scada": false
}
}
},
{
"description": "ClamAV 0.104 toutes versions (fin de vie)",
"product": {
"name": "N/A",
"vendor": {
"name": "ClamAV",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-20290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20290"
},
{
"name": "CVE-2024-20328",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20328"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0104",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits ClamAV\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service et une ex\u00e9cution de code\narbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ClamAV",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ClamAV du 07 f\u00e9vrier 2024",
"url": "https://blog.clamav.net/2023/11/clamav-130-122-105-released.html"
}
]
}
CERTFR-2024-AVI-0104
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits ClamAV. Elles permettent à un attaquant de provoquer un déni de service et une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ClamAV versions ant\u00e9rieures \u00e0 1.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "ClamAV",
"scada": false
}
}
},
{
"description": "ClamAV 0.105 toutes versions (fin de vie)",
"product": {
"name": "N/A",
"vendor": {
"name": "ClamAV",
"scada": false
}
}
},
{
"description": "ClamAV 1.1 toutes versions (fin de vie)",
"product": {
"name": "N/A",
"vendor": {
"name": "ClamAV",
"scada": false
}
}
},
{
"description": "ClamAV versions ant\u00e9rieures \u00e0 1.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "ClamAV",
"scada": false
}
}
},
{
"description": "ClamAV 0.104 toutes versions (fin de vie)",
"product": {
"name": "N/A",
"vendor": {
"name": "ClamAV",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-20290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20290"
},
{
"name": "CVE-2024-20328",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20328"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0104",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits ClamAV\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service et une ex\u00e9cution de code\narbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ClamAV",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ClamAV du 07 f\u00e9vrier 2024",
"url": "https://blog.clamav.net/2023/11/clamav-130-122-105-released.html"
}
]
}
CNVD-2024-12709
Vulnerability from cnvd - Published: 2024-03-13厂商已发布了漏洞修复程序,请及时关注更新: https://blog.clamav.net/2023/11/clamav-130-122-105-released.html
| Name | ClamAV Clamav <1.3.0 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2024-20328",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2024-20328"
}
},
"description": "ClamAV\uff08Clam AntiVirus\uff09\u662fClamAV\u56e2\u961f\u7684\u4e00\u5957\u514d\u8d39\u4e14\u5f00\u6e90\u7684\u6740\u6bd2\u8f6f\u4ef6\u3002\u8be5\u8f6f\u4ef6\u7528\u4e8e\u68c0\u6d4b\u6728\u9a6c\u3001\u75c5\u6bd2\u3001\u6076\u610f\u8f6f\u4ef6\u548c\u5176\u4ed6\u6076\u610f\u5a01\u80c1\u3002\n\nClamAV 1.3.0\u4e4b\u524d\u7248\u672c\u5b58\u5728\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5bf9\u6587\u4ef6\u540d\u7684\u4e0d\u5b89\u5168\u5904\u7406\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5229\u7528\u5e94\u7528\u7a0b\u5e8f\u670d\u52a1\u5e10\u6237\u7684\u6743\u9650\u6ce8\u5165\u4efb\u610f\u547d\u4ee4\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://blog.clamav.net/2023/11/clamav-130-122-105-released.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2024-12709",
"openTime": "2024-03-13",
"patchDescription": "ClamAV\uff08Clam AntiVirus\uff09\u662fClamAV\u56e2\u961f\u7684\u4e00\u5957\u514d\u8d39\u4e14\u5f00\u6e90\u7684\u6740\u6bd2\u8f6f\u4ef6\u3002\u8be5\u8f6f\u4ef6\u7528\u4e8e\u68c0\u6d4b\u6728\u9a6c\u3001\u75c5\u6bd2\u3001\u6076\u610f\u8f6f\u4ef6\u548c\u5176\u4ed6\u6076\u610f\u5a01\u80c1\u3002\r\n\r\nClamAV 1.3.0\u4e4b\u524d\u7248\u672c\u5b58\u5728\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5bf9\u6587\u4ef6\u540d\u7684\u4e0d\u5b89\u5168\u5904\u7406\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5229\u7528\u5e94\u7528\u7a0b\u5e8f\u670d\u52a1\u5e10\u6237\u7684\u6743\u9650\u6ce8\u5165\u4efb\u610f\u547d\u4ee4\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "ClamAV\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "ClamAV Clamav \u003c1.3.0"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2024-20328",
"serverity": "\u4e2d",
"submitTime": "2024-03-06",
"title": "ClamAV\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e"
}
BDU:2024-01734
Vulnerability from fstec - Published: 07.02.2024{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "0.104 (Clam Antivirus), 0.105 (Clam Antivirus), \u043e\u0442 1.0.0 LTS \u0434\u043e 1.0.4 LTS \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Clam Antivirus), 1.1 (Clam Antivirus), 1.2.0 (Clam Antivirus), 1.2.1 (Clam Antivirus)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://blog.clamav.net/2023/11/clamav-130-122-105-released.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "07.02.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "04.03.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "04.03.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-01734",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-20328",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Clam Antivirus",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 VirusEvent \u0441\u043b\u0443\u0436\u0431\u044b ClamD \u043f\u0430\u043a\u0435\u0442\u0430 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c ClamAV, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u0435 \u043c\u0435\u0440 \u043f\u043e \u043d\u0435\u0439\u0442\u0440\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u043e\u0432, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b (\u0412\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u0443 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b) (CWE-78)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 VirusEvent \u0441\u043b\u0443\u0436\u0431\u044b ClamD \u043f\u0430\u043a\u0435\u0442\u0430 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c ClamAV \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u044f \u043c\u0435\u0440 \u043f\u043e \u043d\u0435\u0439\u0442\u0440\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u043e\u0432, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u043d\u044a\u0435\u043a\u0446\u0438\u044f",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://amitschendel.github.io/vulnerabilites/CVE-2024-20328/\nhttps://blog.clamav.net/2023/11/clamav-130-122-105-released.html\nhttps://www.securitylab.ru/news/tags/CVE-2024-20328/\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-20328",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0437\u0430\u0449\u0438\u0442\u044b",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-78",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,3)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,3)"
}
FKIE_CVE-2024-20328
Vulnerability from fkie_nvd - Published: 2024-03-01 21:15 - Updated: 2025-11-04 19:16| URL | Tags | ||
|---|---|---|---|
| psirt@cisco.com | https://blog.clamav.net/2023/11/clamav-130-122-105-released.html | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://blog.clamav.net/2023/11/clamav-130-122-105-released.html | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FXZYVDNV66RNMNVJOHAJAYRZV4U64CQ/ |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7B435D2-E87C-4EF6-B883-3C12ED264AC4",
"versionEndExcluding": "1.0.5",
"versionStartIncluding": "1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3ADA2E9-3E02-4352-8D68-A198DC490AA4",
"versionEndExcluding": "1.2.2",
"versionStartIncluding": "1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands.\nClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\n\n\n"
},
{
"lang": "es",
"value": "Una vulnerabilidad en la caracter\u00edstica VirusEvent de ClamAV podr\u00eda permitir a un atacante local inyectar comandos arbitrarios con los privilegios de la cuenta de servicio de la aplicaci\u00f3n. La vulnerabilidad se debe al manejo inseguro de nombres de archivos. Un atacante local podr\u00eda aprovechar esta vulnerabilidad proporcionando un nombre de archivo que contenga secuencias de l\u00ednea de comandos. Cuando se procesa en un sistema usando opciones de configuraci\u00f3n para la funci\u00f3n VirusEvent, el atacante podr\u00eda hacer que la aplicaci\u00f3n ejecute comandos arbitrarios. ClamAV ha lanzado actualizaciones de software que abordan esta vulnerabilidad. No existen soluciones alternativas que aborden esta vulnerabilidad."
}
],
"id": "CVE-2024-20328",
"lastModified": "2025-11-04T19:16:28.030",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4,
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
},
"published": "2024-03-01T21:15:07.790",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://blog.clamav.net/2023/11/clamav-130-122-105-released.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://blog.clamav.net/2023/11/clamav-130-122-105-released.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FXZYVDNV66RNMNVJOHAJAYRZV4U64CQ/"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
}
GHSA-VHQ6-CJC8-X8V9
Vulnerability from github – Published: 2024-03-01 21:31 – Updated: 2025-11-04 21:31A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands. ClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
{
"affected": [],
"aliases": [
"CVE-2024-20328"
],
"database_specific": {
"cwe_ids": [
"CWE-78"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-03-01T21:15:07Z",
"severity": "MODERATE"
},
"details": "A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands.\nClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.",
"id": "GHSA-vhq6-cjc8-x8v9",
"modified": "2025-11-04T21:31:15Z",
"published": "2024-03-01T21:31:17Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20328"
},
{
"type": "WEB",
"url": "https://blog.clamav.net/2023/11/clamav-130-122-105-released.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FXZYVDNV66RNMNVJOHAJAYRZV4U64CQ"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2024-0322
Vulnerability from csaf_certbund - Published: 2024-02-07 23:00 - Updated: 2024-02-14 23:00Es besteht eine Schwachstelle in ClamAV. Dieser Fehler besteht im OLE2-Dateiparser von ClamAV aufgrund eines Heap-basierten Pufferüberleseproblems, das zu einer Schleife führt. Durch die Übermittlung einer manipulierten Datei mit OLE2-Inhalt, die von ClamAV gescannt werden soll, kann ein entfernter, anonymer Angreifer diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen.
Es besteht eine Schwachstelle in ClamAV. Dieser Fehler besteht in der "VirusEvent"-Funktion von ClamAV aufgrund einer unsachgemäßen Neutralisierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstelle zur Ausführung von beliebigem Code ausnutzen.
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "ClamAV ist ein Open Source Virenscanner.\r\nCisco Secure Endpoint bietet Virenschutz und erweiterte Endpunkt-Erkennung und -Reaktion.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in ClamAV ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder beliebigen Code auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- MacOS X\n- Windows\n- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0322 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0322.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0322 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0322"
},
{
"category": "external",
"summary": "ClamAV Blog vom 2024-02-07",
"url": "http://blog.clamav.net/2023/11/clamav-130-122-105-released.html"
},
{
"category": "external",
"summary": "Cisco Security Advisory vom 2024-02-07",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-hDffu6t"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-471565274B vom 2024-02-08",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-471565274b"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-3439911DF6 vom 2024-02-08",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-3439911df6"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-C42CF0E576 vom 2024-02-08",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c42cf0e576"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6636-1 vom 2024-02-14",
"url": "https://ubuntu.com/security/notices/USN-6636-1"
}
],
"source_lang": "en-US",
"title": "ClamAV: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-02-14T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:04:58.374+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2024-0322",
"initial_release_date": "2024-02-07T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-02-07T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-02-08T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-02-14T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Private Cloud \u003c 3.8.0",
"product": {
"name": "Cisco Secure Endpoint Private Cloud \u003c 3.8.0",
"product_id": "T032554"
}
},
{
"category": "product_version_range",
"name": "Connector \u003c 7.5.17",
"product": {
"name": "Cisco Secure Endpoint Connector \u003c 7.5.17",
"product_id": "T032556"
}
},
{
"category": "product_version_range",
"name": "Connector \u003c 8.2.1",
"product": {
"name": "Cisco Secure Endpoint Connector \u003c 8.2.1",
"product_id": "T032557"
}
}
],
"category": "product_name",
"name": "Secure Endpoint"
}
],
"category": "vendor",
"name": "Cisco"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.2.2",
"product": {
"name": "Open Source ClamAV \u003c 1.2.2",
"product_id": "T032551"
}
},
{
"category": "product_version_range",
"name": "\u003c 1.0.5",
"product": {
"name": "Open Source ClamAV \u003c 1.0.5",
"product_id": "T032552"
}
}
],
"category": "product_name",
"name": "ClamAV"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-20290",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in ClamAV. Dieser Fehler besteht im OLE2-Dateiparser von ClamAV aufgrund eines Heap-basierten Puffer\u00fcberleseproblems, das zu einer Schleife f\u00fchrt. Durch die \u00dcbermittlung einer manipulierten Datei mit OLE2-Inhalt, die von ClamAV gescannt werden soll, kann ein entfernter, anonymer Angreifer diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"T000126",
"74185"
]
},
"release_date": "2024-02-07T23:00:00.000+00:00",
"title": "CVE-2024-20290"
},
{
"cve": "CVE-2024-20328",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in ClamAV. Dieser Fehler besteht in der \"VirusEvent\"-Funktion von ClamAV aufgrund einer unsachgem\u00e4\u00dfen Neutralisierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen."
}
],
"product_status": {
"known_affected": [
"T000126",
"74185"
]
},
"release_date": "2024-02-07T23:00:00.000+00:00",
"title": "CVE-2024-20328"
}
]
}
MSRC_CVE-2024-20328
Vulnerability from csaf_microsoft - Published: 2024-03-02 08:00 - Updated: 2026-02-20 23:10| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2024-20328 ClamAV VirusEvent File Processing Command Injection Vulnerability - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-20328.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "ClamAV VirusEvent File Processing Command Injection Vulnerability",
"tracking": {
"current_release_date": "2026-02-20T23:10:58.000Z",
"generator": {
"date": "2026-02-20T23:52:00.611Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2024-20328",
"initial_release_date": "2024-03-02T08:00:00.000Z",
"revision_history": [
{
"date": "2024-06-30T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-02-20T23:10:58.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 clamav 1.0.6-1",
"product": {
"name": "\u003cazl3 clamav 1.0.6-1",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 clamav 1.0.6-1",
"product": {
"name": "azl3 clamav 1.0.6-1",
"product_id": "17815"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 clamav 0.105.2-4",
"product": {
"name": "\u003cazl3 clamav 0.105.2-4",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 clamav 0.105.2-4",
"product": {
"name": "azl3 clamav 0.105.2-4",
"product_id": "18845"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 clamav 0.105.2-5",
"product": {
"name": "\u003ccbl2 clamav 0.105.2-5",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 clamav 0.105.2-5",
"product": {
"name": "cbl2 clamav 0.105.2-5",
"product_id": "20020"
}
}
],
"category": "product_name",
"name": "clamav"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 clamav 1.0.6-1 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 clamav 1.0.6-1 as a component of Azure Linux 3.0",
"product_id": "17815-17084"
},
"product_reference": "17815",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 clamav 0.105.2-4 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 clamav 0.105.2-4 as a component of Azure Linux 3.0",
"product_id": "18845-17084"
},
"product_reference": "18845",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 clamav 0.105.2-5 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 clamav 0.105.2-5 as a component of CBL Mariner 2.0",
"product_id": "20020-17086"
},
"product_reference": "20020",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-20328",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "general",
"text": "cisco",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"17815-17084",
"18845-17084",
"20020-17086"
],
"known_affected": [
"17084-3",
"17084-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-20328 ClamAV VirusEvent File Processing Command Injection Vulnerability - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-20328.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-30T07:00:00.000Z",
"details": "1.0.6-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-3",
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2024-06-30T07:00:00.000Z",
"details": "0.105.2-5:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalsScore": 0.0,
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"17084-3",
"17084-2",
"17086-1"
]
}
],
"title": "ClamAV VirusEvent File Processing Command Injection Vulnerability"
}
]
}
GSD-2024-20328
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2024-20328",
"id": "GSD-2024-20328"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-20328"
],
"details": "A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands.\nClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\n\n\n",
"id": "GSD-2024-20328",
"modified": "2023-12-13T01:21:42.914210Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2024-20328",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ClamAV",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.2.0"
},
{
"version_affected": "=",
"version_value": "1.2.1"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands.\nClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\n\n\n"
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-78",
"lang": "eng",
"value": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://blog.clamav.net/2023/11/clamav-130-122-105-released.html",
"refsource": "MISC",
"url": "https://blog.clamav.net/2023/11/clamav-130-122-105-released.html"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands.\nClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\n\n\n"
}
],
"id": "CVE-2024-20328",
"lastModified": "2024-03-01T22:22:25.913",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4,
"source": "ykramarz@cisco.com",
"type": "Secondary"
}
]
},
"published": "2024-03-01T21:15:07.790",
"references": [
{
"source": "ykramarz@cisco.com",
"url": "https://blog.clamav.net/2023/11/clamav-130-122-105-released.html"
}
],
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "ykramarz@cisco.com",
"type": "Secondary"
}
]
}
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.