CVE-2022-20698Improper Input Validation in Cisco Clamav

Severity
7.5HIGHNVD
EPSS
0.2%
top 52.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 14
Latest updateJan 19

Description

A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 0.104.1 and LTS version 0.103.4 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper checks that may result in an invalid pointer read. An attacker could exploit this vulnerability by sending a crafted OOXML file to an affected device. An exploit could allow the attacker to cause the ClamAV scannin

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5cisco/clamavunspecified0.103.5+1
NVDclamav/clamav0.104.00.104.2+1
Debianclamav/clamav< 0.103.5+dfsg-0+deb11u1+3

Also affects: Debian Linux 10.0, 11.0, 9.0, Ubuntu Linux 14.04, 16.04, 18.04, 20.04, 20.10, 21.04

🔴Vulnerability Details

3
GHSA
GHSA-q493-fq52-3qhm: A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 02022-01-15
CVEList
Clam AntiVirus (ClamAV) Denial of Service Vulnerability2022-01-14
OSV
CVE-2022-20698: A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 02022-01-14

📋Vendor Advisories

4
Ubuntu
ClamAV vulnerability2022-01-19
Ubuntu
ClamAV vulnerability2022-01-18
Microsoft
Clam AntiVirus (ClamAV) Denial of Service Vulnerability2022-01-11
Debian
CVE-2022-20698: clamav - A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software ...2022
CVE-2022-20698 — Improper Input Validation in Cisco | cvebase