ClamAV OLE2 File Format Parser Vulnerability Could Lead to Denial of Service

CVE-2024-20290

7.5HIGH

Key Information

Vendor
Cisco
Status
Cisco Secure Endpoint
Cisco Secure Endpoint Private Cloud Administration Portal
Cisco Secure Endpoint Private Cloud Console
Vendor
CVE Published:
7 February 2024

Badges

πŸ‘Ύ Exploit ExistsπŸ“° News Worthy

Summary

A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources.

For a description of this vulnerability, see the ClamAV blog .

Affected Version(s)

Cisco Secure Endpoint = 6.0.9

Cisco Secure Endpoint = 6.0.7

Cisco Secure Endpoint = 6.1.5

News Articles

ClamAV Bugs Expose Users to Command Injection (CVE-2024-20328) and DoS Attacks (CVE-2024-20290)

ClamAV's developers issued critical patches addressing two vulnerabilities (CVE-2024-20328 & CVE-2024-20290) within the library

11 months ago

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ“°

    First article discovered by securityonline.info

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 News Article(s)
.