CVE Vulnerabilities

CVE-2022-20796

Untrusted Pointer Dereference

Published: May 04, 2022 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.9 MEDIUM
AV:L/AC:L/Au:N/C:N/I:N/A:C
RedHat/V2
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in Clam AntiVirus (ClamAV) versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2 could allow an authenticated, local attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog.

Weakness

The product obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer.

Affected Software

NameVendorStart VersionEnd Version
ClamavClamav0.103.4 (including)0.103.4 (including)
ClamavClamav0.103.5 (including)0.103.5 (including)
ClamavClamav0.104.1 (including)0.104.1 (including)
ClamavClamav0.104.2 (including)0.104.2 (including)
ClamavUbuntubionic*
ClamavUbuntudevel*
ClamavUbuntuesm-infra-legacy/trusty*
ClamavUbuntuesm-infra/bionic*
ClamavUbuntuesm-infra/focal*
ClamavUbuntuesm-infra/xenial*
ClamavUbuntufocal*
ClamavUbuntuimpish*
ClamavUbuntujammy*
ClamavUbuntukinetic*
ClamavUbuntutrusty/esm*
ClamavUbuntuupstream*

Extended Description

An attacker can supply a pointer for memory locations that the product is not expecting. If the pointer is dereferenced for a write operation, the attack might allow modification of critical state variables, cause a crash, or execute code. If the dereferencing operation is for a read, then the attack might allow reading of sensitive data, cause a crash, or set a variable to an unexpected value (since the value will be read from an unexpected memory location). There are several variants of this weakness, including but not necessarily limited to:

References