We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-20505

ClamAV Memory Handling DoS



Description

A vulnerability in the PDF parsing module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to an out of bounds read. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. An exploit could allow the attacker to terminate the scanning process.

Reserved 2023-11-08 | Published 2024-09-04 | Updated 2024-09-05 | Assigner cisco


MEDIUM: 4.0CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Product status

Default status
unknown

1.4.0
affected

1.3.2
affected

1.0.6
affected

1.0.5
affected

1.0.4
affected

1.0.3
affected

1.0.2
affected

1.0.1
affected

1.0.0
affected

1.2.x
affected

0.105.x
affected

0.104.x
affected

0.103.11
affected

0.103.10
affected

0.103.9
affected

0.103.8
affected

0.103.7
affected

0.103.6
affected

0.103.5
affected

0.103.4
affected

0.103.3
affected

0.103.2
affected

0.103.1
affected

0.103.0
affected

References

blog.clamav.net/...amav-141-132-107-and-010312-security.html

cve.org (CVE-2024-20505)

nvd.nist.gov (CVE-2024-20505)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-20505

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.