An issue was discovered in ClamXAV 3 before 3.1.1. A malicious actor could use a properly signed copy of ClamXAV 2 (running with an injected malicious dylib) to communicate with ClamXAV 3's helper tool and perform privileged operations. This occurs because of inadequate client verification in the helper tool.
References
Link | Resource |
---|---|
https://gist.github.com/matt-clamxav/d341bd48f12a14d2147f8ce860bb36d0 | Third Party Advisory |
Configurations
Information
Published : 2020-10-16 06:15
Updated : 2020-10-21 06:59
NVD link : CVE-2020-26893
Mitre link : CVE-2020-26893
JSON object : View
CWE
CWE-345
Insufficient Verification of Data Authenticity
Products Affected
clamxav
- clamxav