Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2025-AVI-0522
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans ClamAV. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
References
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "ClamAV versions 1.0.x ant\u00e9rieures \u00e0 1.0.9", "product": { "name": "ClamAV", "vendor": { "name": "ClamAV", "scada": false } } }, { "description": "ClamAV versions 1.4.x ant\u00e9rieures \u00e0 1.4.3", "product": { "name": "ClamAV", "vendor": { "name": "ClamAV", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-20260", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20260" }, { "name": "CVE-2025-20234", "url": "https://www.cve.org/CVERecord?id=CVE-2025-20234" } ], "initial_release_date": "2025-06-19T00:00:00", "last_revision_date": "2025-06-19T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0522", "revisions": [ { "description": "Version initiale", "revision_date": "2025-06-19T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans ClamAV. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans ClamAV", "vendor_advisories": [ { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 ClamAV clamav-143-and-109-security-patch", "url": "https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html" } ] }
CVE-2025-20260 (GCVE-0-2025-20260)
Vulnerability from cvelistv5
Published
2025-06-18 17:08
Modified
2025-06-19 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition, cause a denial of service (DoS) condition, or execute arbitrary code on an affected device.
This vulnerability exists because memory buffers are allocated incorrectly when PDF files are processed. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to trigger a buffer overflow, likely resulting in the termination of the ClamAV scanning process and a DoS condition on the affected software. Although unproven, there is also a possibility that an attacker could leverage the buffer overflow to execute arbitrary code with the privileges of the ClamAV process.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20260", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-18T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-19T03:55:07.784Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "ClamAV", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.4.2" }, { "status": "affected", "version": "1.4.1" }, { "status": "affected", "version": "1.4.0" }, { "status": "affected", "version": "1.3.2" }, { "status": "affected", "version": "1.3.1" }, { "status": "affected", "version": "1.3.0" }, { "status": "affected", "version": "1.2.3" }, { "status": "affected", "version": "1.2.2" }, { "status": "affected", "version": "1.2.1" }, { "status": "affected", "version": "1.2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition, cause a denial of service (DoS) condition, or execute arbitrary code on an affected device.\r\n\r\nThis vulnerability exists because memory buffers are allocated incorrectly when PDF files are processed. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to trigger a buffer overflow, likely resulting in the termination of the ClamAV scanning process and a DoS condition on the affected software. Although unproven, there is also a possibility that an attacker could leverage the buffer overflow to execute arbitrary code with the privileges of the ClamAV process." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-18T17:08:36.207Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "clamav-143-and-109-security-patch", "url": "https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html" } ], "source": { "advisory": "clamav-143-and-109-security-patch", "defects": [ "CSCwo64672" ], "discovery": "EXTERNAL" }, "title": "ClamAV PDF Scanning Buffer Overflow Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20260", "datePublished": "2025-06-18T17:08:36.207Z", "dateReserved": "2024-10-10T19:15:13.243Z", "dateUpdated": "2025-06-19T03:55:07.784Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20234 (GCVE-0-2025-20234)
Vulnerability from cvelistv5
Published
2025-06-18 16:20
Modified
2025-06-18 18:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.
For a description of this vulnerability, see the .
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Endpoint |
Version: 7.0.5 Version: 6.2.19 Version: 7.3.3 Version: 7.2.13 Version: 6.1.5 Version: 6.3.1 Version: 6.2.5 Version: 7.3.5 Version: 6.2.1 Version: 7.2.7 Version: 7.1.1 Version: 6.3.5 Version: 6.2.9 Version: 7.3.1 Version: 6.1.7 Version: 7.2.11 Version: 7.2.3 Version: 7.1.5 Version: 6.3.3 Version: 7.3.9 Version: 6.2.3 Version: 6.1.9 Version: 6.0.9 Version: 7.2.5 Version: 6.0.7 Version: 6.3.7 Version: 1.12.3 Version: 1.8.0 Version: 1.11.1 Version: 1.12.4 Version: 1.10.0 Version: 1.12.0 Version: 1.8.1 Version: 1.10.1 Version: 1.12.1 Version: 1.12.6 Version: 1.14.0 Version: 1.10.2 Version: 1.12.7 Version: 1.12.2 Version: 1.6.0 Version: 1.9.0 Version: 1.11.0 Version: 1.7.0 Version: 1.13.0 Version: 1.8.4 Version: 1.13.1 Version: 1.9.1 Version: 1.12.5 Version: 1.13.2 Version: 8.1.7.21512 Version: 8.1.7 Version: 8.1.5 Version: 8.1.3.21242 Version: 8.1.3 Version: 8.1.5.21322 Version: 8.1.7.21417 Version: 1.14.1 Version: 1.15.2 Version: 1.15.3 Version: 1.15.4 Version: 1.15.6 Version: 1.16.0 Version: 1.16.1 Version: 1.16.2 Version: 1.16.3 Version: 1.18.1 Version: 1.21.0 Version: 1.21.2 Version: 1.22.4 Version: 1.24.1 Version: 1.24.2 Version: 1.24.4 Version: 1.17.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20234", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-18T18:20:31.170035Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-18T18:22:44.697Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Secure Endpoint", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "7.0.5" }, { "status": "affected", "version": "6.2.19" }, { "status": "affected", "version": "7.3.3" }, { "status": "affected", "version": "7.2.13" }, { "status": "affected", "version": "6.1.5" }, { "status": "affected", "version": "6.3.1" }, { "status": "affected", "version": "6.2.5" }, { "status": "affected", "version": "7.3.5" }, { "status": "affected", "version": "6.2.1" }, { "status": "affected", "version": "7.2.7" }, { "status": "affected", "version": "7.1.1" }, { "status": "affected", "version": "6.3.5" }, { "status": "affected", "version": "6.2.9" }, { "status": "affected", "version": "7.3.1" }, { "status": "affected", "version": "6.1.7" }, { "status": "affected", "version": "7.2.11" }, { "status": "affected", "version": "7.2.3" }, { "status": "affected", "version": "7.1.5" }, { "status": "affected", "version": "6.3.3" }, { "status": "affected", "version": "7.3.9" }, { "status": "affected", "version": "6.2.3" }, { "status": "affected", "version": "6.1.9" }, { "status": "affected", "version": "6.0.9" }, { "status": "affected", "version": "7.2.5" }, { "status": "affected", "version": "6.0.7" }, { "status": "affected", "version": "6.3.7" }, { "status": "affected", "version": "1.12.3" }, { "status": "affected", "version": "1.8.0" }, { "status": "affected", "version": "1.11.1" }, { "status": "affected", "version": "1.12.4" }, { "status": "affected", "version": "1.10.0" }, { "status": "affected", "version": "1.12.0" }, { "status": "affected", "version": "1.8.1" }, { "status": "affected", "version": "1.10.1" }, { "status": "affected", "version": "1.12.1" }, { "status": "affected", "version": "1.12.6" }, { "status": "affected", "version": "1.14.0" }, { "status": "affected", "version": "1.10.2" }, { "status": "affected", "version": "1.12.7" }, { "status": "affected", "version": "1.12.2" }, { "status": "affected", "version": "1.6.0" }, { "status": "affected", "version": "1.9.0" }, { "status": "affected", "version": "1.11.0" }, { "status": "affected", "version": "1.7.0" }, { "status": "affected", "version": "1.13.0" }, { "status": "affected", "version": "1.8.4" }, { "status": "affected", "version": "1.13.1" }, { "status": "affected", "version": "1.9.1" }, { "status": "affected", "version": "1.12.5" }, { "status": "affected", "version": "1.13.2" }, { "status": "affected", "version": "8.1.7.21512" }, { "status": "affected", "version": "8.1.7" }, { "status": "affected", "version": "8.1.5" }, { "status": "affected", "version": "8.1.3.21242" }, { "status": "affected", "version": "8.1.3" }, { "status": "affected", "version": "8.1.5.21322" }, { "status": "affected", "version": "8.1.7.21417" }, { "status": "affected", "version": "1.14.1" }, { "status": "affected", "version": "1.15.2" }, { "status": "affected", "version": "1.15.3" }, { "status": "affected", "version": "1.15.4" }, { "status": "affected", "version": "1.15.6" }, { "status": "affected", "version": "1.16.0" }, { "status": "affected", "version": "1.16.1" }, { "status": "affected", "version": "1.16.2" }, { "status": "affected", "version": "1.16.3" }, { "status": "affected", "version": "1.18.1" }, { "status": "affected", "version": "1.21.0" }, { "status": "affected", "version": "1.21.2" }, { "status": "affected", "version": "1.22.4" }, { "status": "affected", "version": "1.24.1" }, { "status": "affected", "version": "1.24.2" }, { "status": "affected", "version": "1.24.4" }, { "status": "affected", "version": "1.17.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.\r\nFor a description of this vulnerability, see the ." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-18T16:20:01.175Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-clamav-udf-hmwd9nDy", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-udf-hmwd9nDy" }, { "name": "ClamAV blog", "url": "https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html" } ], "source": { "advisory": "cisco-sa-clamav-udf-hmwd9nDy", "defects": [ "CSCwo45640" ], "discovery": "EXTERNAL" }, "title": "ClamAV UDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20234", "datePublished": "2025-06-18T16:20:01.175Z", "dateReserved": "2024-10-10T19:15:13.237Z", "dateUpdated": "2025-06-18T18:22:44.697Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…