A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2023-08-18T19:55:33.359Z
Updated: 2024-01-25T16:58:19.248Z
Reserved: 2022-10-27T18:47:50.367Z
Link: CVE-2023-20212
JSON object: View
NVD Information
Status : Modified
Published: 2023-08-18T20:15:09.773
Modified: 2024-01-25T17:15:37.033
Link: CVE-2023-20212
JSON object: View
Redhat Information
No data.