On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in Clam AntiVirus (ClamAV) versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2 could allow an authenticated, local attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
27 Jun 2023, 19:00
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-476 |
01 Jul 2022, 18:56
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/ - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56/ - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
03 Jun 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 May 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 May 2022, 18:51
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:clamav:clamav:0.103.4:*:*:*:*:*:*:* cpe:2.3:a:clamav:clamav:0.104.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:* cpe:2.3:a:clamav:clamav:0.104.2:*:*:*:*:*:*:* cpe:2.3:a:clamav:clamav:0.103.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:* cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:* |
|
CVSS |
v2 : v3 : |
v2 : 4.9
v3 : 5.5 |
CWE | CWE-119 | |
References | (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-vL9x58p4 - Third Party Advisory |
04 May 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in Clam AntiVirus (ClamAV) versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2 could allow an authenticated, local attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. |
04 May 2022, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-05-04 17:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-20796
Mitre link : CVE-2022-20796
CVE.ORG link : CVE-2022-20796
JSON object : View
Products Affected
fedoraproject
- fedora
debian
- debian_linux
cisco
- secure_endpoint
clamav
- clamav