Heap Buffer Overflow in ClamAV Affects Local Users
CVE-2022-20792

7.8HIGH

Key Information:

Vendor
Cisco
Vendor
CVE Published:
4 May 2022

Summary

A vulnerability exists in the regex module used by the Clam AntiVirus signature database load module, allowing an authenticated local attacker to potentially crash the service and execute arbitrary code. This arises from improper bounds checking leading to a multi-byte heap buffer overflow. By placing a maliciously crafted CDB signature database file in the ClamAV database directory, an attacker can exploit the flaw, potentially gaining the ability to run code as the clamav user, threatening system integrity.

Affected Version(s)

Clam AntiVirus (ClamAV) <= 0.104.2

Clam AntiVirus (ClamAV) 0.104.0

Clam AntiVirus (ClamAV) <= 0.103.5

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.