CVE-2020-3327

Published: 13 May 2020

A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
clamav
Launchpad, Ubuntu, Debian
Upstream
Released (0.102.4)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(0.102.4+dfsg-1)
Ubuntu 20.04 LTS (Focal Fossa)
Released (0.102.4+dfsg-0ubuntu0.20.04.1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (0.102.4+dfsg-0ubuntu0.18.04.1)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (0.102.4+dfsg-0ubuntu0.16.04.1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (0.102.4+dfsg-0ubuntu0.14.04.1+esm1)
Ubuntu 12.04 ESM (Precise Pangolin)
Released (0.102.4+dfsg-0ubuntu0.12.04.1)