Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-20212 (GCVE-0-2023-20212)
Vulnerability from cvelistv5 – Published: 2023-08-18 19:55 – Updated: 2024-08-02 09:05- CWE-825 - Expired Pointer Dereference
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Secure Endpoint |
Affected:
N/A
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:05:35.369Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-clamav-dos-FTkhqMWZ",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cisco Secure Endpoint",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. \r\n\r This vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-825",
"description": "Expired Pointer Dereference",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-25T16:58:19.248Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-clamav-dos-FTkhqMWZ",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ"
}
],
"source": {
"advisory": "cisco-sa-clamav-dos-FTkhqMWZ",
"defects": [
"CSCwf30972",
"CSCwf30973"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2023-20212",
"datePublished": "2023-08-18T19:55:33.359Z",
"dateReserved": "2022-10-27T18:47:50.367Z",
"dateUpdated": "2024-08-02T09:05:35.369Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*\", \"versionEndExcluding\": \"8.1.7.21585\", \"matchCriteriaId\": \"57FA75E8-D452-4A42-A7D8-064C3932888A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.8.0\", \"matchCriteriaId\": \"D10B7EE9-96DE-4761-834A-FA5C31326A23\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. \\r\\n\\r This vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en el m\\u00f3dulo AutoIt de ClamAV podr\\u00eda permitir a un atacante remoto no autenticado causar una condici\\u00f3n de denegaci\\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a un error l\\u00f3gico en la gesti\\u00f3n de memoria de un dispositivo afectado. Un atacante podr\\u00eda explotar esta vulnerabilidad enviando un archivo AutoIt manipulado para ser escaneado por ClamAV en el dispositivo afectado. Un exploit exitoso podr\\u00eda permitir al atacante causar que el proceso de escaneo de ClamAV se reinicie inesperadamente, resultando en una condici\\u00f3n de DoS. \"}]",
"id": "CVE-2023-20212",
"lastModified": "2024-11-21T07:40:53.953",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2023-08-18T20:15:09.773",
"references": "[{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-825\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-20212\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2023-08-18T20:15:09.773\",\"lastModified\":\"2024-11-21T07:40:53.953\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. \\r\\n\\r This vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el m\u00f3dulo AutoIt de ClamAV podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a un error l\u00f3gico en la gesti\u00f3n de memoria de un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un archivo AutoIt manipulado para ser escaneado por ClamAV en el dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante causar que el proceso de escaneo de ClamAV se reinicie inesperadamente, resultando en una condici\u00f3n de DoS. \"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-825\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*\",\"versionEndExcluding\":\"8.1.7.21585\",\"matchCriteriaId\":\"57FA75E8-D452-4A42-A7D8-064C3932888A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.8.0\",\"matchCriteriaId\":\"D10B7EE9-96DE-4761-834A-FA5C31326A23\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
WID-SEC-W-2023-2090
Vulnerability from csaf_certbund - Published: 2023-08-16 22:00 - Updated: 2025-02-03 23:00Es bestehen mehrere Schwachstellen in ClamAV sowie in Cisco Secure Endpoint. Diese Fehler bestehen in den Komponenten HFS+ und AutoIt aufgrund eines Logikfehlers in der Speicherverwaltung, einer falschen Prüfung auf Vollständigkeit nach einer Kompromierung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen.
Es bestehen mehrere Schwachstellen in ClamAV sowie in Cisco Secure Endpoint. Diese Fehler bestehen in den Komponenten HFS+ und AutoIt aufgrund eines Logikfehlers in der Speicherverwaltung, einer falschen Prüfung auf Vollständigkeit nach einer Kompromierung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen.
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "ClamAV ist ein Open Source Virenscanner.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in ClamAV und Cisco Secure Endpoint ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- CISCO Appliance\n- Linux\n- MacOS X\n- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2090 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2090.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2090 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2090"
},
{
"category": "external",
"summary": "ClamAV Security Advisory vom 2023-08-16",
"url": "http://blog.clamav.net/2023/07/2023-08-16-releases.html"
},
{
"category": "external",
"summary": "Cisco Security Advisory vom 2023-08-16",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ"
},
{
"category": "external",
"summary": "Cisco Security Advisory vom 2023-08-16",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-rNwNEEee"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2023-9F948BEC13 vom 2023-08-18",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-9f948bec13"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2023-BF72D8833E vom 2023-08-18",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-bf72d8833e"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2023-0454CA80FD vom 2023-08-18",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-0454ca80fd"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2023-37FA993C81 vom 2023-08-18",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-37fa993c81"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2023-E2F8CB1EE1 vom 2023-08-19",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-e2f8cb1ee1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6303-2 vom 2023-08-21",
"url": "https://ubuntu.com/security/notices/USN-6303-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6303-1 vom 2023-08-21",
"url": "https://ubuntu.com/security/notices/USN-6303-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:3435-1 vom 2023-08-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/016023.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3544 vom 2023-08-28",
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00033.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:3456-1 vom 2023-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/016037.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2023-2233 vom 2023-09-08",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2233.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2023-2233 vom 2023-09-08",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2233.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2023-1820 vom 2023-09-11",
"url": "https://alas.aws.amazon.com/ALAS-2023-1820.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0328-1 vom 2025-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020256.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0325-1 vom 2025-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020258.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0327-1 vom 2025-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020257.html"
}
],
"source_lang": "en-US",
"title": "ClamAV \u0026 Cisco Secure Endpoint: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-02-03T23:00:00.000+00:00",
"generator": {
"date": "2025-02-04T09:24:08.487+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2023-2090",
"initial_release_date": "2023-08-16T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-08-16T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-08-20T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2023-08-21T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-08-24T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-08-27T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2023-08-28T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-09-07T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-09-10T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-03T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cPrivate Cloud 3.8.0",
"product": {
"name": "Cisco Secure Endpoint \u003cPrivate Cloud 3.8.0",
"product_id": "T029396"
}
},
{
"category": "product_version",
"name": "Private Cloud 3.8.0",
"product": {
"name": "Cisco Secure Endpoint Private Cloud 3.8.0",
"product_id": "T029396-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:secure_endpoint:private_cloud_3.8.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.1.7.215851 (Windows)",
"product": {
"name": "Cisco Secure Endpoint \u003c8.1.7.215851 (Windows)",
"product_id": "T029397"
}
},
{
"category": "product_version",
"name": "8.1.7.215851 (Windows)",
"product": {
"name": "Cisco Secure Endpoint 8.1.7.215851 (Windows)",
"product_id": "T029397-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:secure_endpoint:8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.22.0 (MacOS)",
"product": {
"name": "Cisco Secure Endpoint \u003c1.22.0 (MacOS)",
"product_id": "T029398"
}
},
{
"category": "product_version",
"name": "1.22.0 (MacOS)",
"product": {
"name": "Cisco Secure Endpoint 1.22.0 (MacOS)",
"product_id": "T029398-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:secure_endpoint:1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.22.0 (Linux)",
"product": {
"name": "Cisco Secure Endpoint \u003c1.22.0 (Linux)",
"product_id": "T029399"
}
},
{
"category": "product_version",
"name": "1.22.0 (Linux)",
"product": {
"name": "Cisco Secure Endpoint 1.22.0 (Linux)",
"product_id": "T029399-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:secure_endpoint:1"
}
}
}
],
"category": "product_name",
"name": "Secure Endpoint"
}
],
"category": "vendor",
"name": "Cisco"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.1.1",
"product": {
"name": "Open Source ClamAV \u003c1.1.1",
"product_id": "T029392"
}
},
{
"category": "product_version",
"name": "1.1.1",
"product": {
"name": "Open Source ClamAV 1.1.1",
"product_id": "T029392-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:clamav:clamav:1.1.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.0.2",
"product": {
"name": "Open Source ClamAV \u003c1.0.2",
"product_id": "T029393"
}
},
{
"category": "product_version",
"name": "1.0.2",
"product": {
"name": "Open Source ClamAV 1.0.2",
"product_id": "T029393-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:clamav:clamav:1.0.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c0.103.9",
"product": {
"name": "Open Source ClamAV \u003c0.103.9",
"product_id": "T029394"
}
},
{
"category": "product_version",
"name": "0.103.9",
"product": {
"name": "Open Source ClamAV 0.103.9",
"product_id": "T029394-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:clamav:clamav:0.103.9"
}
}
}
],
"category": "product_name",
"name": "ClamAV"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-20197",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in ClamAV sowie in Cisco Secure Endpoint. Diese Fehler bestehen in den Komponenten HFS+ und AutoIt aufgrund eines Logikfehlers in der Speicherverwaltung, einer falschen Pr\u00fcfung auf Vollst\u00e4ndigkeit nach einer Kompromierung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"T029398",
"T029397",
"T029396",
"2951",
"T002207",
"T029394",
"T029393",
"T000126",
"T029392",
"398363",
"74185",
"T029399"
]
},
"release_date": "2023-08-16T22:00:00.000+00:00",
"title": "CVE-2023-20197"
},
{
"cve": "CVE-2023-20212",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in ClamAV sowie in Cisco Secure Endpoint. Diese Fehler bestehen in den Komponenten HFS+ und AutoIt aufgrund eines Logikfehlers in der Speicherverwaltung, einer falschen Pr\u00fcfung auf Vollst\u00e4ndigkeit nach einer Kompromierung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"T029398",
"T029397",
"T029396",
"2951",
"T002207",
"T029394",
"T029393",
"T000126",
"T029392",
"398363",
"74185",
"T029399"
]
},
"release_date": "2023-08-16T22:00:00.000+00:00",
"title": "CVE-2023-20212"
}
]
}
GHSA-25VX-3H3C-MWV8
Vulnerability from github – Published: 2023-08-18 21:30 – Updated: 2024-01-25 18:30A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition.
{
"affected": [],
"aliases": [
"CVE-2023-20212"
],
"database_specific": {
"cwe_ids": [
"CWE-825"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-08-18T20:15:09Z",
"severity": "HIGH"
},
"details": "A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. \n\n This vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition.",
"id": "GHSA-25vx-3h3c-mwv8",
"modified": "2024-01-25T18:30:41Z",
"published": "2023-08-18T21:30:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20212"
},
{
"type": "WEB",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
CISCO-SA-CLAMAV-DOS-FTKHQMWZ
Vulnerability from csaf_cisco - Published: 2023-08-16 16:00 - Updated: 2023-08-16 16:00| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"acknowledgments": [
{
"summary": "This vulnerability was found during internal security testing."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nFor a description of this vulnerability, see the ClamAV blog [\"https://blog.clamav.net/2023/07/2023-08-16-releases.html\"].\r\n\r\n",
"title": "Summary"
},
{
"category": "general",
"text": "The Vulnerable Products [\"#vp\"]section includes Cisco bug IDs for each affected product. The bugs are accessible through the Cisco Bug Search Tool [\"https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID\"] and contain additional platform-specific information and fixed software releases.",
"title": "Affected Products"
},
{
"category": "general",
"text": "The following table lists Cisco products that are affected by the vulnerability that is described in this advisory. Customers should refer to the associated Cisco bug IDs for further details.\r\n Affected Cisco Software Platform CVSS Base Score Security Impact Rating Cisco Bug ID First Fixed Release Secure Endpoint Connector for Windows [\"#details\"] 7.5 High CSCwf30972 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf30972\"] 8.1.7.215851 Secure Endpoint Private Cloud [\"#details\"] 7.5 High CSCwf30973 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf30973\"] 3.8.0 or later with updated connectors\r\n1. This vulnerability affects the Secure Endpoint Connector for Windows releases between Release 8.1.5.21322 and the first fixed release.",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect the following Cisco products:\r\n\r\nFirepower Threat Defense Software\r\nSecure Endpoint Connector for Linux\r\nSecure Endpoint Connector for MacOS\r\nSecure Email Appliance, formerly Email Security Appliance\r\nSecure Web Appliance\r\n\r\nAttention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see Meet Cisco Secure [\"https://www.cisco.com/c/en/us/products/security/secure-names.html\"].",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "Details about the potential effects of the vulnerability are as follows:\r\n\r\nImpacts of ClamAV DoS Vulnerability on Windows Platforms\r\n\r\nThe Security Impact Rating (SIR) for this vulnerability is High only for Windows-based platforms because those platforms run the ClamAV scanning process as a service that could fail and restart, delaying scanning operations. See the Assessing Security Risk [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#asr\"] section of the Cisco Security Vulnerability Policy for information about vulnerability scoring and SIRs.\r\n\r\nA vulnerability in the AutoIT module of ClamAV could allow an attacker to cause the application to crash, resulting in a DoS condition on an affected device. Cisco Secure Endpoint Connector for Windows, which is distributed from Cisco Secure Endpoint Private Cloud, is affected by this vulnerability.\r\n\r\nBug ID(s): CSCwf30972 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf30972\"] and CSCwf30973 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf30973\"]\r\nSecurity Impact Rating (SIR): High\r\nCVSS Base Score: 7.5\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"title": "Details"
},
{
"category": "general",
"text": "There are no workarounds that address this vulnerability.",
"title": "Workarounds"
},
{
"category": "general",
"text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories [\"https://www.cisco.com/go/psirt\"] page, to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) for their contracted maintenance providers.\r\n Fixed Releases\r\nCustomers are advised to upgrade to an appropriate fixed software release [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"] as indicated in the following tables:\r\n Affected Cisco Software Platform First Fixed Release Secure Endpoint Connector for Windows 8.1.7.215851 Secure Endpoint Private Cloud 3.8.0 or later with updated connectors2\r\n1. Updated releases of Cisco Secure Endpoint are available through the Cisco Secure Endpoint portal. Depending on the configured policy, Cisco Secure Endpoint will automatically update.\r\n2. Affected releases of Cisco Secure Endpoint clients for Cisco Secure Endpoint Private Cloud have been updated in the connectors repository. Customers will get these connector updates through normal content update processes.\r\nThe Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "This vulnerability was found during internal security testing.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@cisco.com",
"issuing_authority": "Cisco PSIRT",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "ClamAV AutoIt Module Denial of Service Vulnerability",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "ClamAV blog",
"url": "https://blog.clamav.net/2023/07/2023-08-16-releases.html"
},
{
"category": "external",
"summary": "Cisco Bug Search Tool",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID"
},
{
"category": "external",
"summary": "CSCwf30972",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf30972"
},
{
"category": "external",
"summary": "CSCwf30973",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf30973"
},
{
"category": "external",
"summary": "Meet Cisco Secure",
"url": "https://www.cisco.com/c/en/us/products/security/secure-names.html"
},
{
"category": "external",
"summary": "Assessing Security Risk",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#asr"
},
{
"category": "external",
"summary": "fixed software releases",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco Security Advisories",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html"
}
],
"title": "ClamAV AutoIt Module Denial of Service Vulnerability",
"tracking": {
"current_release_date": "2023-08-16T16:00:00+00:00",
"generator": {
"date": "2023-08-16T15:59:46+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-clamav-dos-FTkhqMWZ",
"initial_release_date": "2023-08-16T16:00:00+00:00",
"revision_history": [
{
"date": "2023-08-16T15:59:31+00:00",
"number": "1.0.0",
"summary": "Initial public release."
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_family",
"name": "Cisco Secure Endpoint",
"product": {
"name": "Cisco Secure Endpoint ",
"product_id": "CSAFPID-221075"
}
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-20212",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCwf30972"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCwf30973"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221075"
]
},
"release_date": "2023-08-16T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-221075"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-221075"
]
}
],
"title": "ClamAV AutoIt Module Denial of Service Vulnerability"
}
]
}
GSD-2023-20212
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-20212",
"id": "GSD-2023-20212"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-20212"
],
"details": "A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. \r\n\r This vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition.",
"id": "GSD-2023-20212",
"modified": "2023-12-13T01:20:28.292470Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2023-20212",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Secure Endpoint",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "N/A"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. \r\n\r This vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-825",
"lang": "eng",
"value": "Expired Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ",
"refsource": "MISC",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ"
}
]
},
"source": {
"advisory": "cisco-sa-clamav-dos-FTkhqMWZ",
"defects": [
"CSCwf30972",
"CSCwf30973"
],
"discovery": "INTERNAL"
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*",
"matchCriteriaId": "57FA75E8-D452-4A42-A7D8-064C3932888A",
"versionEndExcluding": "8.1.7.21585",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D10B7EE9-96DE-4761-834A-FA5C31326A23",
"versionEndExcluding": "3.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. \r\n\r This vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el m\u00f3dulo AutoIt de ClamAV podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a un error l\u00f3gico en la gesti\u00f3n de memoria de un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un archivo AutoIt manipulado para ser escaneado por ClamAV en el dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante causar que el proceso de escaneo de ClamAV se reinicie inesperadamente, resultando en una condici\u00f3n de DoS. "
}
],
"id": "CVE-2023-20212",
"lastModified": "2024-01-25T17:15:37.033",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "ykramarz@cisco.com",
"type": "Secondary"
}
]
},
"published": "2023-08-18T20:15:09.773",
"references": [
{
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ"
}
],
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-825"
}
],
"source": "ykramarz@cisco.com",
"type": "Secondary"
}
]
}
}
}
}
CERTFR-2023-AVI-0658
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | N/A | Cisco Secure Endpoint Connector (MacOS) versions antérieures à 1.22.0 | ||
| Cisco | N/A | Cisco Secure Endpoint Connector (Windows) versions antérieures à 8.1.7.21585 | ||
| Cisco | N/A | Cisco Secure Endpoint Connector (Linux) versions antérieures à 1.22.0 | ||
| Cisco | N/A | Cisco Duo Device Health Application (Windows) versions 5.0.0 et 5.1.0 antérieures à 5.2.0 | ||
| Cisco | N/A | Cisco Unified CM et Unified CM SME versions 11.5(1) et 12.5(1) antérieures à 12.5(1)SU8 | ||
| Cisco | N/A | Cisco ThousandEyes Enterprise Agent versions antérieures à 0.218 | ||
| Cisco | N/A | Cisco Unified CM et Unified CM SME versions 14 sans le correctif de sécurité ciscocm.V14SU3_CSCwe89928_sql-injection_C0194-1.cop.sha512 | ||
| Cisco | N/A | Cisco Secure Endpoint Private Cloud versions antérieures à 3.8.0 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cisco Secure Endpoint Connector (MacOS) versions ant\u00e9rieures \u00e0 1.22.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Secure Endpoint Connector (Windows) versions ant\u00e9rieures \u00e0 8.1.7.21585",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Secure Endpoint Connector (Linux) versions ant\u00e9rieures \u00e0 1.22.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Duo Device Health Application (Windows) versions 5.0.0 et 5.1.0 ant\u00e9rieures \u00e0 5.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified CM et Unified CM SME versions 11.5(1) et 12.5(1) ant\u00e9rieures \u00e0 12.5(1)SU8",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ThousandEyes Enterprise Agent versions ant\u00e9rieures \u00e0 0.218",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified CM et Unified CM SME versions 14 sans le correctif de s\u00e9curit\u00e9 ciscocm.V14SU3_CSCwe89928_sql-injection_C0194-1.cop.sha512",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Secure Endpoint Private Cloud versions ant\u00e9rieures \u00e0 3.8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-20212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20212"
},
{
"name": "CVE-2023-20224",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20224"
},
{
"name": "CVE-2023-20197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20197"
},
{
"name": "CVE-2023-20229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20229"
},
{
"name": "CVE-2023-20211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20211"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0658",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Cisco\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-cucm-injection-g6MbwH2 du 16 ao\u00fbt 2023",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-injection-g6MbwH2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-duo-dha-filewrite-xPMBMZAK du 16 ao\u00fbt 2023",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-dha-filewrite-xPMBMZAK"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-clamav-rNwNEEee du 16 ao\u00fbt 2023",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-rNwNEEee"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-thoueye-privesc-NVhHGwb3 du 16 ao\u00fbt 2023",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-thoueye-privesc-NVhHGwb3"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-clamav-dos-FTkhqMWZ du 16 ao\u00fbt 2023",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ"
}
]
}
CERTFR-2023-AVI-0658
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | N/A | Cisco Secure Endpoint Connector (MacOS) versions antérieures à 1.22.0 | ||
| Cisco | N/A | Cisco Secure Endpoint Connector (Windows) versions antérieures à 8.1.7.21585 | ||
| Cisco | N/A | Cisco Secure Endpoint Connector (Linux) versions antérieures à 1.22.0 | ||
| Cisco | N/A | Cisco Duo Device Health Application (Windows) versions 5.0.0 et 5.1.0 antérieures à 5.2.0 | ||
| Cisco | N/A | Cisco Unified CM et Unified CM SME versions 11.5(1) et 12.5(1) antérieures à 12.5(1)SU8 | ||
| Cisco | N/A | Cisco ThousandEyes Enterprise Agent versions antérieures à 0.218 | ||
| Cisco | N/A | Cisco Unified CM et Unified CM SME versions 14 sans le correctif de sécurité ciscocm.V14SU3_CSCwe89928_sql-injection_C0194-1.cop.sha512 | ||
| Cisco | N/A | Cisco Secure Endpoint Private Cloud versions antérieures à 3.8.0 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cisco Secure Endpoint Connector (MacOS) versions ant\u00e9rieures \u00e0 1.22.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Secure Endpoint Connector (Windows) versions ant\u00e9rieures \u00e0 8.1.7.21585",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Secure Endpoint Connector (Linux) versions ant\u00e9rieures \u00e0 1.22.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Duo Device Health Application (Windows) versions 5.0.0 et 5.1.0 ant\u00e9rieures \u00e0 5.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified CM et Unified CM SME versions 11.5(1) et 12.5(1) ant\u00e9rieures \u00e0 12.5(1)SU8",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ThousandEyes Enterprise Agent versions ant\u00e9rieures \u00e0 0.218",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified CM et Unified CM SME versions 14 sans le correctif de s\u00e9curit\u00e9 ciscocm.V14SU3_CSCwe89928_sql-injection_C0194-1.cop.sha512",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Secure Endpoint Private Cloud versions ant\u00e9rieures \u00e0 3.8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-20212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20212"
},
{
"name": "CVE-2023-20224",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20224"
},
{
"name": "CVE-2023-20197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20197"
},
{
"name": "CVE-2023-20229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20229"
},
{
"name": "CVE-2023-20211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20211"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0658",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Cisco\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-cucm-injection-g6MbwH2 du 16 ao\u00fbt 2023",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-injection-g6MbwH2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-duo-dha-filewrite-xPMBMZAK du 16 ao\u00fbt 2023",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-dha-filewrite-xPMBMZAK"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-clamav-rNwNEEee du 16 ao\u00fbt 2023",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-rNwNEEee"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-thoueye-privesc-NVhHGwb3 du 16 ao\u00fbt 2023",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-thoueye-privesc-NVhHGwb3"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-clamav-dos-FTkhqMWZ du 16 ao\u00fbt 2023",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ"
}
]
}
CERTFR-2023-AVI-0665
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits ClamAV. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- ClamAV versions 1.1.x antérieures à 1.1.1
- ClamAV versions 1.0.x antérieures à 1.0.2
- ClamAV versions 0.103.x antérieures à 0.103.9
L'éditeur considère les versions 0.104.x et 0.105.x comme étant en fin de vie. Aucun correctif de sécurité ne sera donc publié pour ces versions.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eClamAV versions 1.1.x ant\u00e9rieures \u00e0 1.1.1\u003c/li\u003e \u003cli\u003eClamAV versions 1.0.x ant\u00e9rieures \u00e0 1.0.2\u003c/li\u003e \u003cli\u003eClamAV versions 0.103.x ant\u00e9rieures \u00e0 0.103.9\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eL\u0027\u00e9diteur consid\u00e8re les versions 0.104.x et 0.105.x comme \u00e9tant en fin de vie. Aucun correctif de s\u00e9curit\u00e9 ne sera donc publi\u00e9 pour ces versions.\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-20212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20212"
},
{
"name": "CVE-2023-20197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20197"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 ClamAV\u00a02023-08-16 du 15 ao\u00fbt 2023",
"url": "https://blog.clamav.net/2023/07/2023-08-16-releases.html"
}
],
"reference": "CERTFR-2023-AVI-0665",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits ClamAV\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ClamAV",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ClamAV 2023-08-16 du 15 ao\u00fbt 2023",
"url": null
}
]
}
CERTFR-2023-AVI-0665
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits ClamAV. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- ClamAV versions 1.1.x antérieures à 1.1.1
- ClamAV versions 1.0.x antérieures à 1.0.2
- ClamAV versions 0.103.x antérieures à 0.103.9
L'éditeur considère les versions 0.104.x et 0.105.x comme étant en fin de vie. Aucun correctif de sécurité ne sera donc publié pour ces versions.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eClamAV versions 1.1.x ant\u00e9rieures \u00e0 1.1.1\u003c/li\u003e \u003cli\u003eClamAV versions 1.0.x ant\u00e9rieures \u00e0 1.0.2\u003c/li\u003e \u003cli\u003eClamAV versions 0.103.x ant\u00e9rieures \u00e0 0.103.9\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eL\u0027\u00e9diteur consid\u00e8re les versions 0.104.x et 0.105.x comme \u00e9tant en fin de vie. Aucun correctif de s\u00e9curit\u00e9 ne sera donc publi\u00e9 pour ces versions.\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-20212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20212"
},
{
"name": "CVE-2023-20197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20197"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 ClamAV\u00a02023-08-16 du 15 ao\u00fbt 2023",
"url": "https://blog.clamav.net/2023/07/2023-08-16-releases.html"
}
],
"reference": "CERTFR-2023-AVI-0665",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits ClamAV\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ClamAV",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ClamAV 2023-08-16 du 15 ao\u00fbt 2023",
"url": null
}
]
}
BDU:2023-04937
Vulnerability from fstec - Published: 16.08.2023{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 3.8.0 (Secure Endpoint Private Cloud), \u0434\u043e 8.1.7.215851 (Secure Endpoint Connector)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "16.08.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "28.08.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "28.08.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-04937",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-20212",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Secure Endpoint Private Cloud, Secure Endpoint Connector",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f AutoIt \u043f\u0430\u043a\u0435\u0442\u0430 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c ClamAV \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c Cisco Secure Endpoint Connector \u0434\u043b\u044f Windows, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u0430\u044f \u0437\u0430\u0447\u0438\u0441\u0442\u043a\u0430 \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 (CWE-404)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f AutoIt \u043f\u0430\u043a\u0435\u0442\u0430 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c ClamAV \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c Cisco Secure Endpoint Connector \u0434\u043b\u044f Windows \u0441\u0432\u044f\u0437\u0430\u043d\u0430 c \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u0437\u0430\u0447\u0438\u0441\u0442\u043a\u043e\u0439 \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u0421\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0437\u0430\u0449\u0438\u0442\u044b, \u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0437\u0430\u0449\u0438\u0442\u044b",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-404",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
FKIE_CVE-2023-20212
Vulnerability from fkie_nvd - Published: 2023-08-18 20:15 - Updated: 2024-11-21 07:407.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| psirt@cisco.com | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | secure_endpoint | * | |
| cisco | secure_endpoint_private_cloud | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*",
"matchCriteriaId": "57FA75E8-D452-4A42-A7D8-064C3932888A",
"versionEndExcluding": "8.1.7.21585",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D10B7EE9-96DE-4761-834A-FA5C31326A23",
"versionEndExcluding": "3.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. \r\n\r This vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el m\u00f3dulo AutoIt de ClamAV podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a un error l\u00f3gico en la gesti\u00f3n de memoria de un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un archivo AutoIt manipulado para ser escaneado por ClamAV en el dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante causar que el proceso de escaneo de ClamAV se reinicie inesperadamente, resultando en una condici\u00f3n de DoS. "
}
],
"id": "CVE-2023-20212",
"lastModified": "2024-11-21T07:40:53.953",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-18T20:15:09.773",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-825"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.