This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Clamav First view 2006-08-08
Product Clamav Last view 2020-07-20
Version 0.88.3 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:clamav:clamav

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.5 2020-07-20 CVE-2020-3481

A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.

6.5 2020-01-15 CVE-2019-15961

A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.

7.5 2019-11-15 CVE-2013-7089

ClamAV before 0.97.7: dbg_printhex possible information leak

9.8 2019-11-15 CVE-2013-7088

ClamAV before 0.97.7 has buffer overflow in the libclamav component

9.8 2019-11-15 CVE-2013-7087

ClamAV before 0.97.7 has WWPack corrupt heap memory

9.8 2019-11-06 CVE-2007-0899

There is a possible heap overflow in libclamav/fsg.c before 0.100.0.

7.5 2019-11-05 CVE-2019-1789

ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.

7.5 2019-11-05 CVE-2019-12625

ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.

5.5 2019-04-08 CVE-2019-1798

A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.

5.5 2019-04-08 CVE-2019-1788

A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.

5.5 2019-04-08 CVE-2019-1787

A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.

5.5 2018-10-15 CVE-2018-15378

A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the "unmew11()" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.

3.3 2018-07-16 CVE-2018-0361

ClamAV before 0.100.1 lacks a PDF object length check, resulting in an unreasonably long time to parse a relatively small file.

5.5 2018-07-16 CVE-2018-0360

ClamAV before 0.100.1 has an HWP integer overflow with a resultant infinite loop via a crafted Hangul Word Processor file. This is in parsehwp3_paragraph() in libclamav/hwp.c.

5.5 2018-03-27 CVE-2018-0202

clamscan in ClamAV before 0.99.4 contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause an out-of-bounds read when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition. This concerns pdf_parse_array and pdf_parse_string in libclamav/pdfng.c. Cisco Bug IDs: CSCvh91380, CSCvh91400.

7.5 2018-01-26 CVE-2017-12380

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.

9.8 2018-01-26 CVE-2017-12379

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in the message parsing function on an affected system. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a messageAddArgument (in message.c) buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition or execute arbitrary code on an affected device.

5.5 2018-01-26 CVE-2017-12378

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device.

9.8 2018-01-26 CVE-2017-12377

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap-based buffer over-read condition in mew.c when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device.

7.8 2018-01-26 CVE-2017-12376

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause a handle_pdfname (in pdf.c) buffer overflow when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code.

7.5 2018-01-26 CVE-2017-12375

The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions (the rfc2047 function in mbox.c). An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device.

7.5 2018-01-26 CVE-2017-12374

The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations (mbox.c operations on bounce messages). If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition.

5.5 2016-10-03 CVE-2016-1372

ClamAV (aka Clam AntiVirus) before 0.99.2 allows remote attackers to cause a denial of service (application crash) via a crafted 7z file.

5.5 2016-10-03 CVE-2016-1371

ClamAV (aka Clam AntiVirus) before 0.99.2 allows remote attackers to cause a denial of service (application crash) via a crafted mew packer executable.

5 2015-05-12 CVE-2015-2668

ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted xz archive file.

CWE : Common Weakness Enumeration

%idName
22% (11) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
14% (7) CWE-125 Out-of-bounds Read
12% (6) CWE-399 Resource Management Errors
10% (5) CWE-189 Numeric Errors
10% (5) CWE-20 Improper Input Validation
4% (2) CWE-476 NULL Pointer Dereference
4% (2) CWE-284 Access Control (Authorization) Issues
4% (2) CWE-17 Code
2% (1) CWE-787 Out-of-bounds Write
2% (1) CWE-416 Use After Free
2% (1) CWE-404 Improper Resource Shutdown or Release
2% (1) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (1) CWE-200 Information Exposure
2% (1) CWE-190 Integer Overflow or Wraparound
2% (1) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
2% (1) CWE-94 Failure to Control Generation of Code ('Code Injection')

Open Source Vulnerability Database (OSVDB)

id Description
76785 ClamAV Multiple Function Recursion Level File Handling Remote DoS
74181 ClamAV clamd libclamav/matcher-hash.c cli_hm_scan() Function Crafted Message ...
70937 ClamAV vba_extract.c vba_read_project_strings() Function Double-free Arbitrar...
69656 ClamAV libclamav pdf.c PDF File Handling DoS (2010-4479)
69612 ClamAV libclamav pe_icons.c icon_cb() Function Off-by-one Memory Corruption
69611 ClamAV libclamav pdf.c PDF File Handling DoS (2010-4260)
68302 ClamAV pdf.c find_stream_bounds Function Crafted PDF File Handling Overflow
64774 ClamAV libclamav/pdf.c cli_pdf() Function PDF File Handling DoS
63861 ClamAV Malformed CAB File Scanning Bypass
63818 ClamAV libclamav/mspack.c qtm_decompress Function Crafted CAB Archive DoS
53603 ClamAV libclamav/phishcheck.c cli_url_canon() Function URL Handling Overflow
53602 ClamAV Malformed UPack Packed File Handling DoS
53598 ClamAV --detect-broken Option PE File Handling DoS
53597 ClamAV RAR Archive Invalid Uncompressed Size Field Scan Bypass
53461 ClamAV libclamav/untar.c clamd / clamscan Infinite Loop DoS
51963 ClamAV LZH Archive Handling DoS
42296 ClamAV libclamav libclamav/mew.c unmew11 Function Unspecified Heap Corruption
27809 Clam AntiVirus UPX libclamav/upx.c pefromupx Function rsize Value Overflow

OpenVAS Exploits

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-07-16 Name : Fedora Update for clamav FEDORA-2012-9577
File : nvt/gb_fedora_2012_9577_clamav_fc16.nasl
2012-04-02 Name : Fedora Update for clamav FEDORA-2011-15033
File : nvt/gb_fedora_2011_15033_clamav_fc16.nasl
2012-02-12 Name : Gentoo Security Advisory GLSA 201110-20 (Clam AntiVirus)
File : nvt/glsa_201110_20.nasl
2011-11-22 Name : ClamAV Recursion Level Handling Denial of Service Vulnerability (Windows)
File : nvt/secpod_clamav_recursion_dos_vuln_win.nasl
2011-11-11 Name : Ubuntu Update for clamav USN-1258-1
File : nvt/gb_ubuntu_USN_1258_1.nasl
2011-11-11 Name : Fedora Update for clamav FEDORA-2011-15119
File : nvt/gb_fedora_2011_15119_clamav_fc15.nasl
2011-11-11 Name : Fedora Update for clamav FEDORA-2011-15076
File : nvt/gb_fedora_2011_15076_clamav_fc14.nasl
2011-08-29 Name : ClamAV Hash Manager Off-By-One Denial of Service Vulnerability (Win)
File : nvt/secpod_clamav_hash_manager_dos_vuln_win.nasl
2011-08-26 Name : Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001)
File : nvt/secpod_macosx_su11-001.nasl
2011-08-19 Name : Fedora Update for clamav FEDORA-2011-10090
File : nvt/gb_fedora_2011_10090_clamav_fc15.nasl
2011-08-19 Name : Fedora Update for clamav FEDORA-2011-10053
File : nvt/gb_fedora_2011_10053_clamav_fc14.nasl
2011-08-18 Name : Mandriva Update for clamav MDVSA-2011:122 (clamav)
File : nvt/gb_mandriva_MDVSA_2011_122.nasl
2011-08-02 Name : Ubuntu Update for clamav USN-1179-1
File : nvt/gb_ubuntu_USN_1179_1.nasl
2011-03-15 Name : Fedora Update for clamav FEDORA-2011-2743
File : nvt/gb_fedora_2011_2743_clamav_fc14.nasl
2011-03-15 Name : Fedora Update for clamav FEDORA-2011-2741
File : nvt/gb_fedora_2011_2741_clamav_fc13.nasl
2011-03-09 Name : Gentoo Security Advisory GLSA 201009-06 (clamav)
File : nvt/glsa_201009_06.nasl
2011-03-07 Name : Ubuntu Update for clamav vulnerability USN-1076-1
File : nvt/gb_ubuntu_USN_1076_1.nasl
2011-02-22 Name : ClamAV 'vba_read_project_strings()' Double Free Memory Corruption Vulnerability
File : nvt/gb_clamav_46470.nasl
2010-12-28 Name : Fedora Update for clamav FEDORA-2010-18564
File : nvt/gb_fedora_2010_18564_clamav_fc13.nasl
2010-12-23 Name : Ubuntu Update for clamav vulnerabilities USN-1031-1
File : nvt/gb_ubuntu_USN_1031_1.nasl
2010-12-23 Name : Mandriva Update for clamav MDVSA-2010:249 (clamav)
File : nvt/gb_mandriva_MDVSA_2010_249.nasl
2010-12-23 Name : Fedora Update for clamav FEDORA-2010-18568
File : nvt/gb_fedora_2010_18568_clamav_fc14.nasl
2010-12-02 Name : Fedora Update for clamav FEDORA-2010-13012
File : nvt/gb_fedora_2010_13012_clamav_fc14.nasl
2010-12-02 Name : ClamAV Prior to 0.96.5 Multiple Vulnerabilities
File : nvt/gb_clamav_45152.nasl
2010-10-07 Name : ClamAV 'find_stream_bounds()' function Buffer Overflow Vulnerability
File : nvt/gb_clamav_pdf_bof_vuln_lin.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2013-A-0179 Apple Mac OS X Security Update 2013-004
Severity: Category I - VMSKEY: V0040373

Snort® IPS/IDS

Date Description
2014-01-10 ClamAV UPX File Handling Heap overflow attempt
RuleID : 24238 - Type : FILE-EXECUTABLE - Revision : 5
2014-01-10 ClamAV UPX File Handling Heap overflow attempt
RuleID : 24237 - Type : FILE-EXECUTABLE - Revision : 5
2014-01-10 ClamAV UPX FileHandling Heap overflow attempt
RuleID : 17493 - Type : FILE-OTHER - Revision : 13

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-14 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2019-1146.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-847fe2ed61.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-eff94da132.nasl - Type: ACT_GATHER_INFO
2018-10-25 Name: The remote Debian host is missing a security update.
File: debian_DLA-1553.nasl - Type: ACT_GATHER_INFO
2018-10-17 Name: The remote Fedora host is missing a security update.
File: fedora_2018-1fc39f2d13.nasl - Type: ACT_GATHER_INFO
2018-10-04 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_8b812395c73911e8ab5b9c5c8e75236a.nasl - Type: ACT_GATHER_INFO
2018-08-22 Name: The remote Debian host is missing a security update.
File: debian_DLA-1461.nasl - Type: ACT_GATHER_INFO
2018-08-03 Name: The antivirus service running on the remote host is affected by multiple vuln...
File: clamav_0_100_1.nasl - Type: ACT_GATHER_INFO
2018-07-10 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_d1e9d8c5839b11e896109c5c8e75236a.nasl - Type: ACT_GATHER_INFO
2018-04-23 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201804-16.nasl - Type: ACT_GATHER_INFO
2018-03-27 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-976.nasl - Type: ACT_GATHER_INFO
2018-03-19 Name: The remote Debian host is missing a security update.
File: debian_DLA-1307.nasl - Type: ACT_GATHER_INFO
2018-03-14 Name: The remote Fedora host is missing a security update.
File: fedora_2018-d2b08aa37f.nasl - Type: ACT_GATHER_INFO
2018-03-07 Name: The remote Fedora host is missing a security update.
File: fedora_2018-602b5345fa.nasl - Type: ACT_GATHER_INFO
2018-02-22 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-958.nasl - Type: ACT_GATHER_INFO
2018-02-07 Name: The remote Fedora host is missing a security update.
File: fedora_2018-958b22c73f.nasl - Type: ACT_GATHER_INFO
2018-02-06 Name: The antivirus service running on the remote host is affected by multiple deni...
File: clamav_0_99_3.nasl - Type: ACT_GATHER_INFO
2018-01-30 Name: The remote Fedora host is missing a security update.
File: fedora_2018-cb339851e7.nasl - Type: ACT_GATHER_INFO
2018-01-29 Name: The remote Debian host is missing a security update.
File: debian_DLA-1261.nasl - Type: ACT_GATHER_INFO
2018-01-29 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_b464f61b84c74e1c8ad46cf9efffd025.nasl - Type: ACT_GATHER_INFO
2018-01-29 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201801-19.nasl - Type: ACT_GATHER_INFO
2016-10-06 Name: The antivirus service running on the remote host is affected by multiple deni...
File: clamav_0_99_2.nasl - Type: ACT_GATHER_INFO
2016-09-29 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-3093-1.nasl - Type: ACT_GATHER_INFO
2016-01-04 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201512-08.nasl - Type: ACT_GATHER_INFO
2015-06-04 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2015-537.nasl - Type: ACT_GATHER_INFO