A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.
References
Link | Resource |
---|---|
https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html | Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2021-04-08T00:00:00
Updated: 2021-04-13T13:00:26
Reserved: 2020-11-13T00:00:00
Link: CVE-2021-1404
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-04-08T05:15:13.267
Modified: 2022-08-05T17:18:28.780
Link: CVE-2021-1404
JSON object: View
Redhat Information
No data.