Remote Code Execution Vulnerability in ClamAV AntiVirus Software
CVE-2017-12374

7.5HIGH

Key Information:

Vendor
Debian
Vendor
CVE Published:
26 January 2018

Summary

ClamAV AntiVirus software versions up to 0.99.2 are impacted by a vulnerability resulting from inadequate input validation during mail parsing operations. Specifically, the issue arises during the processing of bounce messages in the mbox.c file, where an unauthenticated remote attacker can exploit this weakness. Successfully executing this attack could cause a use-after-free condition, leading to potential service disruptions, including a denial of service on affected devices.

Affected Version(s)

ClamAV AntiVirus software 0.99.2 and prior ClamAV AntiVirus software versions 0.99.2 and prior

References

EPSS Score

5% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.