Remote Code Execution Vulnerability in ClamAV AntiVirus Software
CVE-2017-12374
7.5HIGH
Key Information:
- Vendor
- Debian
- Vendor
- CVE Published:
- 26 January 2018
Summary
ClamAV AntiVirus software versions up to 0.99.2 are impacted by a vulnerability resulting from inadequate input validation during mail parsing operations. Specifically, the issue arises during the processing of bounce messages in the mbox.c file, where an unauthenticated remote attacker can exploit this weakness. Successfully executing this attack could cause a use-after-free condition, leading to potential service disruptions, including a denial of service on affected devices.
Affected Version(s)
ClamAV AntiVirus software 0.99.2 and prior ClamAV AntiVirus software versions 0.99.2 and prior
References
EPSS Score
5% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved