On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in Clam AntiVirus (ClamAV) versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2 could allow an authenticated, local attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 06:43
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.9
v3 : 6.5 |
References | () https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56/ - | |
References | () https://security.gentoo.org/glsa/202310-01 - | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-vL9x58p4 - Third Party Advisory |
07 Nov 2023, 03:42
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
01 Oct 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2023, 19:00
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-476 |
Information
Published : 2022-05-04 17:15
Updated : 2024-11-21 06:43
NVD link : CVE-2022-20796
Mitre link : CVE-2022-20796
CVE.ORG link : CVE-2022-20796
JSON object : View
Products Affected
cisco
- secure_endpoint
debian
- debian_linux
clamav
- clamav
fedoraproject
- fedora