CVE Vulnerabilities

CVE-2022-20796

Untrusted Pointer Dereference

Published: May 04, 2022 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.9 MEDIUM
AV:L/AC:L/Au:N/C:N/I:N/A:C
RedHat/V2
RedHat/V3
Ubuntu
LOW

On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in Clam AntiVirus (ClamAV) versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2 could allow an authenticated, local attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog.

Weakness

The product obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer.

Affected Software

Name Vendor Start Version End Version
Clamav Clamav 0.103.4 (including) 0.103.4 (including)
Clamav Clamav 0.103.5 (including) 0.103.5 (including)
Clamav Clamav 0.104.1 (including) 0.104.1 (including)
Clamav Clamav 0.104.2 (including) 0.104.2 (including)
Clamav Ubuntu bionic *
Clamav Ubuntu devel *
Clamav Ubuntu esm-infra/xenial *
Clamav Ubuntu focal *
Clamav Ubuntu impish *
Clamav Ubuntu jammy *
Clamav Ubuntu kinetic *
Clamav Ubuntu trusty/esm *
Clamav Ubuntu upstream *

Extended Description

An attacker can supply a pointer for memory locations that the product is not expecting. If the pointer is dereferenced for a write operation, the attack might allow modification of critical state variables, cause a crash, or execute code. If the dereferencing operation is for a read, then the attack might allow reading of sensitive data, cause a crash, or set a variable to an unexpected value (since the value will be read from an unexpected memory location). There are several variants of this weakness, including but not necessarily limited to:

References