Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-12374

Опубликовано: 26 янв. 2018
Источник: nvd
CVSS3: 7.5
CVSS2: 7.8
EPSS Низкий

Описание

The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations (mbox.c operations on bounce messages). If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
Версия до 0.99.2 (включая)

EPSS

Процентиль: 89%
0.04838
Низкий

7.5 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-416

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations (mbox.c operations on bounce messages). If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition.

CVSS3: 7.5
debian
около 8 лет назад

The ClamAV AntiVirus software versions 0.99.2 and prior contain a vuln ...

CVSS3: 7.5
github
больше 3 лет назад

The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations (mbox.c operations on bounce messages). If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition.

suse-cvrf
около 8 лет назад

Security update for clamav

suse-cvrf
около 8 лет назад

Security update for clamav

EPSS

Процентиль: 89%
0.04838
Низкий

7.5 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-416