A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources. For a description of this vulnerability, see the ClamAV blog .
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Secure_endpoint | Cisco | * | 7.5.17 (excluding) |
Secure_endpoint | Cisco | 8.0.1.21160 (including) | 8.2.3.30119 (excluding) |
Secure_endpoint_private_cloud | Cisco | * | 3.8.0 (excluding) |
Clamav | Ubuntu | bionic | * |
Clamav | Ubuntu | devel | * |
Clamav | Ubuntu | mantic | * |
Clamav | Ubuntu | noble | * |
Clamav | Ubuntu | trusty | * |
Clamav | Ubuntu | xenial | * |