CVE Vulnerabilities

CVE-2024-20290

Buffer Over-read

Published: Feb 07, 2024 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources. For a description of this vulnerability, see the ClamAV blog .

Weakness

The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.

Affected Software

NameVendorStart VersionEnd Version
Secure_endpointCisco*7.5.17 (excluding)
Secure_endpointCisco8.0.1.21160 (including)8.2.3.30119 (excluding)
Secure_endpoint_private_cloudCisco*3.8.0 (excluding)
ClamavUbuntubionic*
ClamavUbuntudevel*
ClamavUbuntumantic*
ClamavUbuntunoble*
ClamavUbuntutrusty*
ClamavUbuntuxenial*

References