ClamAV DoS vulnerability
Vulnerability details
ClamAV is vulnerable to a heap-based buffer over-read or buffer overflow due to the usage of zlib library when analysing a gzip crafted file.
Impacted products
Revisions
Version |
Date |
Description |
v1 |
02/21/2023 |
Initial release |
Stormshield Network Security |
CVSS v3.1 Overall Score: 5.3
|
Analysis
|
Impacted version
|
If a correctly forged gzip file is analyzed by ClamAV it could lead to its crash , due to the usage of the Zlib library, and therefore a temporary antiviral unavailability.
|
- SNS 3.7.31 to 3.7.33
- SNS 3.11.0 to 3.11.21
- SNS 4.3.0 to 4.3.15
- SNS 4.6.0 to 4.6.2
|
Workaround solution
|
Solution
|
Use Kaspersky or Bitdefender as an alternative
|
The following versions fix this vulnerability:
- 3.7.34
- 3.11.22
- 4.3.16
- 4.6.3
|
Attack Vector |
Attack Complexity |
Privileges Required |
User Interaction |
Scope |
Confidentiality Impact |
Integrity Impact |
Availability impact |
Network |
Low |
None |
None |
Unchanged |
None |
None |
Low |
Exploit Code Maturity |
Remediation Level |
Report Confidence |
Unproven that exploit exists |
Official fix |
Confirmed |
Confidentiality Requirement |
Integrity Requirement |
Availability Requirement |
High |
High |
High |