ClamAV DoS vulnerability

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2022-027 CVE-2022-37434 08/09/2022 medium v1

Vulnerability details

ClamAV is vulnerable to a heap-based buffer over-read or buffer overflow due to the usage of zlib library when analysing a gzip crafted file.

Impacted products

Stormshield Network Security medium SNS is impacted


Version Date Description
v1 02/21/2023 Initial release

Stormshield Network Security

CVSS v3.1 Overall Score: 5.3      


Impacted version

If a correctly forged  gzip file is analyzed by ClamAV it could lead to its crash , due to the usage of the Zlib library, and therefore a temporary antiviral unavailability.

  • SNS 3.7.31 to 3.7.33
  • SNS 3.11.0 to 3.11.21
  • SNS 4.3.0 to 4.3.15
  • SNS 4.6.0 to 4.6.2

Workaround solution


Use Kaspersky or Bitdefender as an alternative

The following versions fix this vulnerability:

  • 3.7.34
  • 3.11.22
  • 4.3.16
  • 4.6.3

Attack Vector Attack Complexity Privileges Required User Interaction Scope Confidentiality Impact Integrity Impact Availability impact
Network Low None None Unchanged None None Low
CVSS Base score: 5.3 CVSS Vector: (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploit Code Maturity Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 4.6 CVSS Vector: (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
Confidentiality Requirement Integrity Requirement Availability Requirement
High High High
CVSS Environmental score: 5.3 CVSS Vector: (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X)