CVE-2024-20290
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources.
For a description of this vulnerability, see the ClamAV blog .
Una vulnerabilidad en el analizador de formato de archivo OLE2 de ClamAV podría permitir que un atacante remoto no autenticado provoque una condición de denegación de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a una comprobación incorrecta de los valores de fin de cadena durante el análisis, lo que puede provocar una sobrelectura del búfer de almacenamiento dinámico. Un atacante podría aprovechar esta vulnerabilidad enviando un archivo manipulado que contenga contenido OLE2 para que ClamAV lo analice en un dispositivo afectado. Un exploit exitoso podría permitir al atacante provocar que finalice el proceso de escaneo de ClamAV, lo que resultaría en una condición DoS en el software afectado y consumiría los recursos disponibles del sistema. Para obtener una descripción de esta vulnerabilidad, consulte el blog de ClamAV.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-11-08 CVE Reserved
- 2024-02-07 CVE Published
- 2024-02-16 EPSS Updated
- 2024-11-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-125: Out-of-bounds Read
- CWE-126: Buffer Over-read
CAPEC
References (3)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Secure Endpoint Search vendor "Cisco" for product "Secure Endpoint" | < 7.5.17 Search vendor "Cisco" for product "Secure Endpoint" and version " < 7.5.17" | windows |
Affected
| ||||||
Cisco Search vendor "Cisco" | Secure Endpoint Search vendor "Cisco" for product "Secure Endpoint" | >= 8.0.1.21160 < 8.2.3.30119 Search vendor "Cisco" for product "Secure Endpoint" and version " >= 8.0.1.21160 < 8.2.3.30119" | windows |
Affected
| ||||||
Cisco Search vendor "Cisco" | Secure Endpoint Private Cloud Search vendor "Cisco" for product "Secure Endpoint Private Cloud" | < 3.8.0 Search vendor "Cisco" for product "Secure Endpoint Private Cloud" and version " < 3.8.0" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 38 Search vendor "Fedoraproject" for product "Fedora" and version "38" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 39 Search vendor "Fedoraproject" for product "Fedora" and version "39" | - |
Affected
|