Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2019-01403

Опубликовано: 26 мар. 2019
Источник: fstec
CVSS3: 8.2
CVSS2: 8.5
EPSS Средний

Описание

Уязвимость пакета антивирусных программ ClamAV связана с выходом операции за границы буфера в памяти при обработке OLE2 файлов. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании

Вендор

Canonical Ltd.
Novell Inc.
The ClamAV Team
Сообщество свободного программного обеспечения

Наименование ПО

Ubuntu
SUSE Linux Enterprise
Clam Antivirus
Debian GNU/Linux

Версия ПО

14.04 LTS (Ubuntu)
16.04 LTS (Ubuntu)
18.04 LTS (Ubuntu)
18.10 (Ubuntu)
12.04 ESM (Ubuntu)
Server 11 SP3 LTSS (SUSE Linux Enterprise)
Server 11 SP4 (SUSE Linux Enterprise)
Server 12 GA LTSS (SUSE Linux Enterprise)
Server 12 SP1 LTSS (SUSE Linux Enterprise)
Server 12 SP2 LTSS (SUSE Linux Enterprise)
Server for SAP Applications 11 SP3 (SUSE Linux Enterprise)
Server for SAP Applications 12 GA (SUSE Linux Enterprise)
до 0.101.1 включительно (Clam Antivirus)
19.04 (Ubuntu)
Desktop 12 SP3 (SUSE Linux Enterprise)
Desktop 12 SP4 (SUSE Linux Enterprise)
High Performance Computing 12 (SUSE Linux Enterprise)
Module for Basesystem 15 GA (SUSE Linux Enterprise)
Server 12 SP3 (SUSE Linux Enterprise)
Server 12 SP4 (SUSE Linux Enterprise)
Server for SAP Applications 12 SP2 (SUSE Linux Enterprise)
Server for SAP Applications 12 SP4 (SUSE Linux Enterprise)
8 (Debian GNU/Linux)

Тип ПО

Операционная система
Средство защиты

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 8,5)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 8,2)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://blog.clamav.net/2019/03/clamav-01012-and-01003-patches-have.html

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 93%
0.10248
Средний

8.2 High

CVSS3

8.5 High

CVSS2

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 7 лет назад

A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.

CVSS3: 5.5
nvd
почти 7 лет назад

A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.

CVSS3: 5.5
debian
почти 7 лет назад

A vulnerability in the Object Linking & Embedding (OLE2) file scanning ...

CVSS3: 5.5
github
больше 3 лет назад

A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.

suse-cvrf
почти 7 лет назад

Security update for clamav

EPSS

Процентиль: 93%
0.10248
Средний

8.2 High

CVSS3

8.5 High

CVSS2