中危 clamav 安全漏洞 (CVE-2023-20197)

CVE编号

CVE-2023-20197

利用情况

暂无

补丁情况

官方补丁

披露时间

2023-08-17
漏洞描述
A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources.
For a description of this vulnerability, see the ClamAV blog .
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 cisco secure_endpoint * Up to
(excluding)
1.22.0
运行在以下环境
应用 cisco secure_endpoint * Up to
(excluding)
7.5.13.21586
运行在以下环境
应用 cisco secure_endpoint * From
(including)
8.0.1.21160
Up to
(excluding)
8.1.7.21585
运行在以下环境
应用 cisco secure_endpoint_private_cloud * Up to
(excluding)
3.8.0
运行在以下环境
系统 alpine_3.19 clamav * Up to
(excluding)
1.1.1-r0
运行在以下环境
系统 amazon_2 clamav * Up to
(excluding)
0.103.9-1.amzn2.0.2
运行在以下环境
系统 amazon_2023 clamav * Up to
(excluding)
0.103.9-1.amzn2023.0.2
运行在以下环境
系统 amazon_AMI clamav * Up to
(excluding)
0.103.9-1.55.amzn1
运行在以下环境
系统 debian_10 clamav * Up to
(excluding)
0.103.9+dfsg-0+deb10u1
运行在以下环境
系统 debian_11 clamav * Up to
(excluding)
0.103.9+dfsg-0+deb11u1
运行在以下环境
系统 debian_12 clamav * Up to
(excluding)
1.0.2+dfsg-1~deb12u1
运行在以下环境
系统 fedoraproject fedora 38 -
运行在以下环境
系统 fedora_37 clamd * Up to
(excluding)
0.103.9-1.fc37
运行在以下环境
系统 fedora_38 clamd * Up to
(excluding)
1.0.2-1.fc38
运行在以下环境
系统 fedora_EPEL_7 clamd * Up to
(excluding)
0.103.9-1.el7
运行在以下环境
系统 fedora_EPEL_8 clamd * Up to
(excluding)
0.103.9-1.el8
运行在以下环境
系统 fedora_EPEL_9 clamd * Up to
(excluding)
1.0.2-1.el9
运行在以下环境
系统 opensuse_Leap_15.4 clamav * Up to
(excluding)
0.103.9-150000.3.47.1
运行在以下环境
系统 opensuse_Leap_15.5 clamav * Up to
(excluding)
0.103.9-150000.3.47.1
运行在以下环境
系统 suse_12_SP5 clamav * Up to
(excluding)
0.103.9-3.27.1
运行在以下环境
系统 ubuntu_20.04 clamav * Up to
(excluding)
0.103.9+dfsg-0ubuntu0.20.04.1
运行在以下环境
系统 ubuntu_22.04 clamav * Up to
(excluding)
0.103.9+dfsg-0ubuntu0.22.04.1
阿里云评分
6.2
  • 攻击路径
    本地
  • 攻击复杂度
    复杂
  • 权限要求
    普通权限
  • 影响范围
    越权影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-835 不可达退出条件的循环(无限循环)
阿里云安全产品覆盖情况