An issue was discovered in ClamXAV 3 before 3.1.1. A malicious actor could use a properly signed copy of ClamXAV 2 (running with an injected malicious dylib) to communicate with ClamXAV 3's helper tool and perform privileged operations. This occurs because of inadequate client verification in the helper tool.
References
Link | Resource |
---|---|
https://gist.github.com/matt-clamxav/d341bd48f12a14d2147f8ce860bb36d0 | Third Party Advisory |
https://gist.github.com/matt-clamxav/d341bd48f12a14d2147f8ce860bb36d0 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/matt-clamxav/d341bd48f12a14d2147f8ce860bb36d0 - Third Party Advisory |
Information
Published : 2020-10-16 13:15
Updated : 2024-11-21 05:20
NVD link : CVE-2020-26893
Mitre link : CVE-2020-26893
CVE.ORG link : CVE-2020-26893
JSON object : View
Products Affected
clamxav
- clamxav
CWE
CWE-345
Insufficient Verification of Data Authenticity