CVE-2018-0202

clamscan in ClamAV before 0.99.4 contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause an out-of-bounds read when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition. This concerns pdf_parse_array and pdf_parse_string in libclamav/pdfng.c. Cisco Bug IDs: CSCvh91380, CSCvh91400.
References
Link Resource
https://bugzilla.clamav.net/show_bug.cgi?id=11973 Issue Tracking Patch Third Party Advisory
https://bugzilla.clamav.net/show_bug.cgi?id=11980 Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/03/msg00011.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201804-16 Third Party Advisory
https://usn.ubuntu.com/3592-1/ Third Party Advisory
https://usn.ubuntu.com/3592-2/ Third Party Advisory
https://bugzilla.clamav.net/show_bug.cgi?id=11973 Issue Tracking Patch Third Party Advisory
https://bugzilla.clamav.net/show_bug.cgi?id=11980 Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/03/msg00011.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201804-16 Third Party Advisory
https://usn.ubuntu.com/3592-1/ Third Party Advisory
https://usn.ubuntu.com/3592-2/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:37

Type Values Removed Values Added
References () https://bugzilla.clamav.net/show_bug.cgi?id=11973 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.clamav.net/show_bug.cgi?id=11973 - Issue Tracking, Patch, Third Party Advisory
References () https://bugzilla.clamav.net/show_bug.cgi?id=11980 - Issue Tracking, Third Party Advisory () https://bugzilla.clamav.net/show_bug.cgi?id=11980 - Issue Tracking, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/03/msg00011.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/03/msg00011.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/201804-16 - Third Party Advisory () https://security.gentoo.org/glsa/201804-16 - Third Party Advisory
References () https://usn.ubuntu.com/3592-1/ - Third Party Advisory () https://usn.ubuntu.com/3592-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3592-2/ - Third Party Advisory () https://usn.ubuntu.com/3592-2/ - Third Party Advisory

Information

Published : 2018-03-27 09:29

Updated : 2024-11-21 03:37


NVD link : CVE-2018-0202

Mitre link : CVE-2018-0202

CVE.ORG link : CVE-2018-0202


JSON object : View

Products Affected

canonical

  • ubuntu_linux

clamav

  • clamav

debian

  • debian_linux
CWE
CWE-125

Out-of-bounds Read