Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-12375

Опубликовано: 26 янв. 2018
Источник: nvd
CVSS3: 7.5
CVSS2: 7.8
EPSS Низкий

Описание

The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions (the rfc2047 function in mbox.c). An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
Версия до 0.99.2 (включая)

EPSS

Процентиль: 91%
0.06456
Низкий

7.5 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions (the rfc2047 function in mbox.c). An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device.

CVSS3: 7.5
debian
около 8 лет назад

The ClamAV AntiVirus software versions 0.99.2 and prior contain a vuln ...

CVSS3: 7.5
github
больше 3 лет назад

The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions (the rfc2047 function in mbox.c). An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device.

suse-cvrf
около 8 лет назад

Security update for clamav

suse-cvrf
около 8 лет назад

Security update for clamav

EPSS

Процентиль: 91%
0.06456
Низкий

7.5 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-119