Логотип exploitDog
bind:CVE-2024-20506
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-20506

Количество 12

Количество 12

ubuntu логотип

CVE-2024-20506

больше 1 года назад

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files. The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2024-20506

больше 1 года назад

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files. The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.

CVSS3: 6.1
EPSS: Низкий
msrc логотип

CVE-2024-20506

больше 1 года назад

ClamAV Privilege Handling Escalation Vulnerability

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2024-20506

больше 1 года назад

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) ...

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-h5fr-q576-q7rv

больше 1 года назад

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files. The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2024-07098

больше 1 года назад

Уязвимость службы ClamD пакета антивирусных программ ClamAV, позволяющая нарушителю нарушить целостность системных файлов или вызвать отказ в обслуживании

CVSS3: 6.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3306-1

больше 1 года назад

Security update for clamav

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3305-1

больше 1 года назад

Security update for clamav

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3228-1

больше 1 года назад

Security update for clamav

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0328-1

около 1 года назад

Security update for clamav

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0327-1

около 1 года назад

Security update for clamav

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0325-1

около 1 года назад

Security update for clamav

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-20506

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files. The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.

CVSS3: 6.1
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-20506

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files. The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.

CVSS3: 6.1
0%
Низкий
больше 1 года назад
msrc логотип
CVE-2024-20506

ClamAV Privilege Handling Escalation Vulnerability

CVSS3: 6.1
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-20506

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) ...

CVSS3: 6.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-h5fr-q576-q7rv

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files. The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.

CVSS3: 6.1
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-07098

Уязвимость службы ClamD пакета антивирусных программ ClamAV, позволяющая нарушителю нарушить целостность системных файлов или вызвать отказ в обслуживании

CVSS3: 6.1
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3306-1

Security update for clamav

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3305-1

Security update for clamav

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3228-1

Security update for clamav

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0328-1

Security update for clamav

около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0327-1

Security update for clamav

около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0325-1

Security update for clamav

около 1 года назад

Уязвимостей на страницу