A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.
References
Link | Resource |
---|---|
https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html | Release Notes Vendor Advisory |
https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html - Release Notes, Vendor Advisory |
Information
Published : 2021-04-08 05:15
Updated : 2024-11-21 05:44
NVD link : CVE-2021-1404
Mitre link : CVE-2021-1404
CVE.ORG link : CVE-2021-1404
JSON object : View
Products Affected
clamav
- clamav