Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-15961

Опубликовано: 15 янв. 2020
Источник: debian
EPSS Низкий

Описание

A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
clamavfixed0.102.1+dfsg-1package
clamavfixed0.102.1+dfsg-0+deb10u1busterpackage
clamavfixed0.102.1+dfsg-0+deb9u2stretchpackage

Примечания

  • https://blog.clamav.net/2019/11/clamav-01021-and-01015-patches-have.html

EPSS

Процентиль: 84%
0.02219
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.

CVSS3: 7.5
nvd
около 6 лет назад

A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.

CVSS3: 6.5
msrc
больше 5 лет назад

Описание отсутствует

suse-cvrf
около 6 лет назад

Security update for clamav

suse-cvrf
около 6 лет назад

Security update for clamav

EPSS

Процентиль: 84%
0.02219
Низкий