A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
References
Link | Resource |
---|---|
https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2020/08/msg00010.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ67VH37NCG25PICGWFWZHSVG7PBT7MC/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN/ | |
https://security.gentoo.org/glsa/202007-23 | Third Party Advisory |
https://usn.ubuntu.com/4435-1/ | Third Party Advisory |
https://usn.ubuntu.com/4435-2/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2020-07-20T00:00:00
Updated: 2020-08-06T07:06:03
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3481
JSON object: View
NVD Information
Status : Modified
Published: 2020-07-20T18:15:12.420
Modified: 2023-11-07T03:22:47.407
Link: CVE-2020-3481
JSON object: View
Redhat Information
No data.
CWE