// For flags

CVE-2023-20197

 

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources.
For a description of this vulnerability, see the ClamAV blog .

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-10-27 CVE Reserved
  • 2023-08-16 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-08-22 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Secure Endpoint
Search vendor "Cisco" for product "Secure Endpoint"
< 1.22.0
Search vendor "Cisco" for product "Secure Endpoint" and version " < 1.22.0"
linux
Affected
Cisco
Search vendor "Cisco"
Secure Endpoint
Search vendor "Cisco" for product "Secure Endpoint"
< 1.22.0
Search vendor "Cisco" for product "Secure Endpoint" and version " < 1.22.0"
macos
Affected
Cisco
Search vendor "Cisco"
Secure Endpoint
Search vendor "Cisco" for product "Secure Endpoint"
< 7.5.13.21586
Search vendor "Cisco" for product "Secure Endpoint" and version " < 7.5.13.21586"
windows
Affected
Cisco
Search vendor "Cisco"
Secure Endpoint
Search vendor "Cisco" for product "Secure Endpoint"
>= 8.0.1.21160 < 8.1.7.21585
Search vendor "Cisco" for product "Secure Endpoint" and version " >= 8.0.1.21160 < 8.1.7.21585"
windows
Affected
Cisco
Search vendor "Cisco"
Secure Endpoint Private Cloud
Search vendor "Cisco" for product "Secure Endpoint Private Cloud"
< 3.8.0
Search vendor "Cisco" for product "Secure Endpoint Private Cloud" and version " < 3.8.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
38
Search vendor "Fedoraproject" for product "Fedora" and version "38"
-
Affected