Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-20506

Опубликовано: 04 сент. 2024
Источник: ubuntu
Приоритет: medium
CVSS3: 6.1

Описание

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files. The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.

РелизСтатусПримечание
devel

released

1.3.1+dfsg-5ubuntu2
esm-infra-legacy/trusty

needed

esm-infra/bionic

released

0.103.12+dfsg-0ubuntu0.18.04.1+esm1
esm-infra/focal

released

0.103.12+dfsg-0ubuntu0.20.04.1
esm-infra/xenial

released

0.103.12+dfsg-0ubuntu0.16.04.1+esm1
focal

released

0.103.12+dfsg-0ubuntu0.20.04.1
jammy

released

0.103.12+dfsg-0ubuntu0.22.04.1
noble

released

1.0.7+dfsg-0ubuntu0.24.04.1
oracular

released

1.3.1+dfsg-5ubuntu2
plucky

released

1.3.1+dfsg-5ubuntu2

Показывать по

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
nvd
больше 1 года назад

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files. The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.

CVSS3: 6.1
msrc
около 1 года назад

ClamAV Privilege Handling Escalation Vulnerability

CVSS3: 6.1
debian
больше 1 года назад

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) ...

CVSS3: 6.1
github
больше 1 года назад

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files. The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.

CVSS3: 6.1
fstec
больше 1 года назад

Уязвимость службы ClamD пакета антивирусных программ ClamAV, позволяющая нарушителю нарушить целостность системных файлов или вызвать отказ в обслуживании

6.1 Medium

CVSS3