CVE-2018-0202
Published: 6 March 2018
clamscan in ClamAV before 0.99.4 contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause an out-of-bounds read when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition. This concerns pdf_parse_array and pdf_parse_string in libclamav/pdfng.c. Cisco Bug IDs: CSCvh91380, CSCvh91400.
Priority
CVSS 3 base score: 5.5
Status
Package | Release | Status |
---|---|---|
clamav Launchpad, Ubuntu, Debian |
artful |
Released
(0.99.4+addedllvm-0ubuntu0.17.10.1)
|
precise |
Released
(0.99.4+addedllvm-0ubuntu0.12.04.2)
|
|
trusty |
Released
(0.99.4+addedllvm-0ubuntu0.14.04.1)
|
|
upstream |
Released
(0.99.4)
|
|
xenial |
Released
(0.99.4+addedllvm-0ubuntu0.16.04.1)
|
|
Patches: upstream: https://github.com/Cisco-Talos/clamav-devel/commit/87aaa10b29476958f5bf54b6119a133069f944fc upstream: https://github.com/Cisco-Talos/clamav-devel/commit/700ed96af56077cb1a9bff7b91d21db112f6465d upstream: https://github.com/Cisco-Talos/clamav-devel/commit/0df2fedf2805e574512c486b32a0fff4ed394560 upstream: https://github.com/Cisco-Talos/clamav-devel/commit/495fce917445063d519f14b0009cee025f817bc3 upstream: https://github.com/Cisco-Talos/clamav-devel/commit/99eadf7a9ad351210165312362d1f32b77c6f857 |