CVE-2020-26893

An issue was discovered in ClamXAV 3 before 3.1.1. A malicious actor could use a properly signed copy of ClamXAV 2 (running with an injected malicious dylib) to communicate with ClamXAV 3's helper tool and perform privileged operations. This occurs because of inadequate client verification in the helper tool.
Configurations

Configuration 1 (hide)

cpe:2.3:a:clamxav:clamxav:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:20

Type Values Removed Values Added
References () https://gist.github.com/matt-clamxav/d341bd48f12a14d2147f8ce860bb36d0 - Third Party Advisory () https://gist.github.com/matt-clamxav/d341bd48f12a14d2147f8ce860bb36d0 - Third Party Advisory

Information

Published : 2020-10-16 13:15

Updated : 2024-11-21 05:20


NVD link : CVE-2020-26893

Mitre link : CVE-2020-26893

CVE.ORG link : CVE-2020-26893


JSON object : View

Products Affected

clamxav

  • clamxav
CWE
CWE-345

Insufficient Verification of Data Authenticity