CVE-2023-20197
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources.
For a description of this vulnerability, see the ClamAV blog .
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-10-27 CVE Reserved
- 2023-08-16 CVE Published
- 2024-08-02 CVE Updated
- 2024-08-22 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Secure Endpoint Search vendor "Cisco" for product "Secure Endpoint" | < 1.22.0 Search vendor "Cisco" for product "Secure Endpoint" and version " < 1.22.0" | linux |
Affected
| ||||||
Cisco Search vendor "Cisco" | Secure Endpoint Search vendor "Cisco" for product "Secure Endpoint" | < 1.22.0 Search vendor "Cisco" for product "Secure Endpoint" and version " < 1.22.0" | macos |
Affected
| ||||||
Cisco Search vendor "Cisco" | Secure Endpoint Search vendor "Cisco" for product "Secure Endpoint" | < 7.5.13.21586 Search vendor "Cisco" for product "Secure Endpoint" and version " < 7.5.13.21586" | windows |
Affected
| ||||||
Cisco Search vendor "Cisco" | Secure Endpoint Search vendor "Cisco" for product "Secure Endpoint" | >= 8.0.1.21160 < 8.1.7.21585 Search vendor "Cisco" for product "Secure Endpoint" and version " >= 8.0.1.21160 < 8.1.7.21585" | windows |
Affected
| ||||||
Cisco Search vendor "Cisco" | Secure Endpoint Private Cloud Search vendor "Cisco" for product "Secure Endpoint Private Cloud" | < 3.8.0 Search vendor "Cisco" for product "Secure Endpoint Private Cloud" and version " < 3.8.0" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 38 Search vendor "Fedoraproject" for product "Fedora" and version "38" | - |
Affected
|