CVE-2022-20770
ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
El 20 de abril de 2022, fue divulgada la siguiente vulnerabilidad en ClamAV scanning library versiones 0.103.5 y anteriores y 0.104.2 y anteriores: Una vulnerabilidad en el analizador de archivos CHM de Clam AntiVirus (ClamAV) versiones 0.104.0 hasta 0.104.2 y LTS versión 0.103.5 y anteriores, podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio en un dispositivo afectado. Para una descripción de esta vulnerabilidad, vea el blog de ClamAV. Este aviso será actualizado a medida que esté disponible información adicional
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2021-11-02 CVE Reserved
- 2022-05-04 CVE Published
- 2024-11-06 CVE Updated
- 2024-11-12 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-399: Resource Management Errors
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Clamav Search vendor "Clamav" | Clamav Search vendor "Clamav" for product "Clamav" | <= 0.103.5 Search vendor "Clamav" for product "Clamav" and version " <= 0.103.5" | lts |
Affected
| ||||||
Clamav Search vendor "Clamav" | Clamav Search vendor "Clamav" for product "Clamav" | >= 0.104.0 <= 0.104.2 Search vendor "Clamav" for product "Clamav" and version " >= 0.104.0 <= 0.104.2" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Secure Endpoint Search vendor "Cisco" for product "Secure Endpoint" | < 1.16.3 Search vendor "Cisco" for product "Secure Endpoint" and version " < 1.16.3" | macos |
Affected
| ||||||
Cisco Search vendor "Cisco" | Secure Endpoint Search vendor "Cisco" for product "Secure Endpoint" | < 1.17.2 Search vendor "Cisco" for product "Secure Endpoint" and version " < 1.17.2" | linux |
Affected
| ||||||
Cisco Search vendor "Cisco" | Secure Endpoint Search vendor "Cisco" for product "Secure Endpoint" | < 7.5.5 Search vendor "Cisco" for product "Secure Endpoint" and version " < 7.5.5" | windows |
Affected
| ||||||
Cisco Search vendor "Cisco" | Secure Endpoint Search vendor "Cisco" for product "Secure Endpoint" | >= 1.18.0 < 1.18.2 Search vendor "Cisco" for product "Secure Endpoint" and version " >= 1.18.0 < 1.18.2" | linux |
Affected
| ||||||
Cisco Search vendor "Cisco" | Secure Endpoint Search vendor "Cisco" for product "Secure Endpoint" | >= 1.18.0 < 1.18.2 Search vendor "Cisco" for product "Secure Endpoint" and version " >= 1.18.0 < 1.18.2" | macos |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 34 Search vendor "Fedoraproject" for product "Fedora" and version "34" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 35 Search vendor "Fedoraproject" for product "Fedora" and version "35" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 36 Search vendor "Fedoraproject" for product "Fedora" and version "36" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|