Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2024-01734

Опубликовано: 07 фев. 2024
Источник: fstec
CVSS3: 5.3
CVSS2: 4.3
EPSS Низкий

Описание

Уязвимость функции VirusEvent службы ClamD пакета антивирусных программ ClamAV существует из-за непринятия мер по нейтрализации специальных элементов, используемых в команде операционной системы. Эксплуатация уязвимости может позволить нарушителю выполнить произвольные команды

Вендор

Cisco Systems Inc.

Наименование ПО

Clam Antivirus

Версия ПО

0.104 (Clam Antivirus)
0.105 (Clam Antivirus)
от 1.0.0 LTS до 1.0.4 LTS включительно (Clam Antivirus)
1.1 (Clam Antivirus)
1.2.0 (Clam Antivirus)
1.2.1 (Clam Antivirus)

Тип ПО

Программное средство защиты

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,3)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,3)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://blog.clamav.net/2023/11/clamav-130-122-105-released.html

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 49%
0.00256
Низкий

5.3 Medium

CVSS3

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 2 года назад

A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands. ClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

CVSS3: 5.3
nvd
почти 2 года назад

A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands. ClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

CVSS3: 5.3
msrc
больше 1 года назад

ClamAV VirusEvent File Processing Command Injection Vulnerability

CVSS3: 5.3
debian
почти 2 года назад

A vulnerability in the VirusEvent feature of ClamAV could allow a loca ...

CVSS3: 5.3
github
почти 2 года назад

A vulnerability in the VirusEvent feature of ClamAV could allow a local attacker to inject arbitrary commands with the privileges of the application service account.The vulnerability is due to unsafe handling of file names. A local attacker could exploit this vulnerability by supplying a file name containing command-line sequences. When processed on a system using configuration options for the VirusEvent feature, the attacker could cause the application to execute arbitrary commands. ClamAV has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

EPSS

Процентиль: 49%
0.00256
Низкий

5.3 Medium

CVSS3

4.3 Medium

CVSS2