Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-20506

Опубликовано: 04 сент. 2024
Источник: nvd
CVSS3: 6.1
EPSS Низкий

Описание

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files.

The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
Версия до 0.103.12 (исключая)
cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
Версия от 0.104.0 (включая) до 1.0.7 (исключая)
cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
Версия от 1.2.0 (включая) до 1.3.2 (исключая)
cpe:2.3:a:clamav:clamav:1.4.0:*:*:*:*:*:*:*

EPSS

Процентиль: 11%
0.00036
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-754
CWE-754

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 1 года назад

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files. The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.

CVSS3: 6.1
msrc
около 1 года назад

ClamAV Privilege Handling Escalation Vulnerability

CVSS3: 6.1
debian
больше 1 года назад

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) ...

CVSS3: 6.1
github
больше 1 года назад

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files. The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.

CVSS3: 6.1
fstec
больше 1 года назад

Уязвимость службы ClamD пакета антивирусных программ ClamAV, позволяющая нарушителю нарушить целостность системных файлов или вызвать отказ в обслуживании

EPSS

Процентиль: 11%
0.00036
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-754
CWE-754