ADVISORY!

TLP : CLEAR

Date : 08/02/2024

REF NO : CERT / 2024/02/11

Cisco ClamAV Denial of Service Vulnerability

Severity Level: Medium

Components Affected

  • Cisco Secure Endpoint Connector for Windows versions prior to 7.5.17
  • Cisco Secure Endpoint Connector for Windows versions prior to 8.2.1
  • Cisco Secure Endpoint Private Cloud versions prior to 3.8.0

Overview

A vulnerability was identified in Cisco ClamAV. A remote attacker could exploit this vulnerability to trigger denial of service condition on the targeted system.

Description

A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources. 

Impact

  • Denial of Service

Solution/ Workarounds

Before installation of the software, please visit the vendor web-site for more details.

Apply fixes issued by the vendor:

Reference

Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.

Sri Lanka Computer Emergency Readiness Team | Coordination Centre

Copyright © 2023 SRI LANKA CERT | CC