Buffer Over-Read Vulnerability in ClamAV AntiVirus Software
CVE-2017-12377
9.8CRITICAL
Key Information:
- Vendor
- Debian
- Vendor
- CVE Published:
- 26 January 2018
Summary
ClamAV AntiVirus software versions prior to 0.99.3 expose a vulnerability due to inadequate input validation in mew packet files. This flaw allows an unauthenticated remote attacker to exploit a heap-based buffer over-read condition while ClamAV scans infected files. Exploiting this vulnerability could result in a denial of service (DoS) or arbitrary code execution on the affected device, posing significant security risks for systems utilizing this antivirus software.
Affected Version(s)
ClamAV AntiVirus software 0.99.2 and prior ClamAV AntiVirus software versions 0.99.2 and prior
References
EPSS Score
26% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved