A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
References
Link | Resource |
---|---|
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs59062 | Third Party Advisory |
https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html | Release Notes Vendor Advisory |
https://usn.ubuntu.com/4280-1/ | Third Party Advisory |
https://usn.ubuntu.com/4280-2/ | Third Party Advisory |
https://security.gentoo.org/glsa/202003-46 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2020-02-05 10:15
Updated : 2022-01-01 11:56
NVD link : CVE-2020-3123
Mitre link : CVE-2020-3123
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
canonical
- ubuntu_linux
clamav
- clamav