CVE-2017-12380
Ubuntu Security Notice USN-3550-2
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.
ClamAV AntiVirus, en versiones 0.99.2 y anteriores, contiene una vulnerabilidad que podría permitir que un atacante remoto sin autenticar provoque una denegación de servicio (DoS) en un sistema afectado. La vulnerabilidad se debe a errores en los mecanismos de comprobación de validación de entradas en mbox.c durante ciertas funciones de análisis de email en un dispositivo afectado. Un atacante remoto no autenticado podría explotar esta vulnerabilidad enviando un email manipulado a un dispositivo afectado. Un exploit podría desencadenar una condición de desreferencia de puntero NULL cuando ClamAV escanea el email malicioso, lo que podría resultar en una condición de DoS.
It was discovered that ClamAV incorrectly handled parsing certain mail messages. A remote attacker could use this issue to cause ClamAV to crash, resulting in a denial of service, or possibly execute arbitrary code. It was discovered that ClamAV incorrectly handled parsing certain PDF files. A remote attacker could use this issue to cause ClamAV to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2017-08-03 CVE Reserved
- 2018-01-26 CVE Published
- 2024-12-02 CVE Updated
- 2024-12-02 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2018/01/msg00035.html | Mailing List |
|
URL | Date | SRC |
---|---|---|
https://bugzilla.clamav.net/show_bug.cgi?id=11945 | 2024-12-02 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html | 2018-03-16 | |
https://usn.ubuntu.com/3550-1 | 2018-03-16 | |
https://usn.ubuntu.com/3550-2 | 2018-03-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Clamav Search vendor "Clamav" | Clamav Search vendor "Clamav" for product "Clamav" | <= 0.99.2 Search vendor "Clamav" for product "Clamav" and version " <= 0.99.2" | - |
Affected
|