Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-12380

Опубликовано: 26 янв. 2018
Источник: nvd
CVSS3: 7.5
CVSS2: 7.8
EPSS Низкий

Описание

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
Версия до 0.99.2 (включая)

EPSS

Процентиль: 92%
0.08975
Низкий

7.5 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-476

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.

CVSS3: 7.5
debian
около 8 лет назад

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerab ...

CVSS3: 7.5
github
больше 3 лет назад

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.

suse-cvrf
около 8 лет назад

Security update for clamav

suse-cvrf
около 8 лет назад

Security update for clamav

EPSS

Процентиль: 92%
0.08975
Низкий

7.5 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-476