ALT-PU-2020-2218-1
Closed vulnerabilities
BDU:2019-01403
Уязвимость пакета антивирусных программ ClamAV, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02881
Уязвимость функции BZ2_decompress утилиты для сжатия данных bzip2, позволяющая нарушителю выполнить произвольный код
BDU:2020-01710
Уязвимость пакета антивирусных программ ClamAV, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-12625
ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.
Modified: 2024-11-21
CVE-2019-12900
BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
- openSUSE-SU-2019:1781
- openSUSE-SU-2019:1781
- openSUSE-SU-2019:1918
- openSUSE-SU-2019:1918
- openSUSE-SU-2019:2595
- openSUSE-SU-2019:2595
- openSUSE-SU-2019:2597
- openSUSE-SU-2019:2597
- http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
- http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
- http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
- http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
- https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
- https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
- [kafka-users] 20200413 CVEs for the dependency software guava and rocksdbjni of Kafka
- [kafka-users] 20200413 CVEs for the dependency software guava and rocksdbjni of Kafka
- [flink-user] 20210717 Re: Flink 1.13.1 - Vulnerabilities CVE-2019-12900 for librocksdbjni
- [flink-user] 20210717 Re: Flink 1.13.1 - Vulnerabilities CVE-2019-12900 for librocksdbjni
- [flink-user] 20210716 Flink 1.13.1 - Vulnerabilities CVE-2019-12900 for librocksdbjni
- [flink-user] 20210716 Flink 1.13.1 - Vulnerabilities CVE-2019-12900 for librocksdbjni
- [debian-lts-announce] 20190624 [SECURITY] [DLA 1833-1] bzip2 security update
- [debian-lts-announce] 20190624 [SECURITY] [DLA 1833-1] bzip2 security update
- [debian-lts-announce] 20190718 [SECURITY] [DLA 1833-2] bzip2 regression update
- [debian-lts-announce] 20190718 [SECURITY] [DLA 1833-2] bzip2 regression update
- [debian-lts-announce] 20191010 [SECURITY] [DLA 1953-1] clamav security update
- [debian-lts-announce] 20191010 [SECURITY] [DLA 1953-1] clamav security update
- [debian-lts-announce] 20191014 [SECURITY] [DLA 1953-2] clamav regression update
- [debian-lts-announce] 20191014 [SECURITY] [DLA 1953-2] clamav regression update
- 20190806 FreeBSD Security Advisory FreeBSD-SA-19:18.bzip2
- 20190806 FreeBSD Security Advisory FreeBSD-SA-19:18.bzip2
- 20190715 [slackware-security] bzip2 (SSA:2019-195-01)
- 20190715 [slackware-security] bzip2 (SSA:2019-195-01)
- FreeBSD-SA-19:18
- FreeBSD-SA-19:18
- https://support.f5.com/csp/article/K68713584?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K68713584?utm_source=f5support&%3Butm_medium=RSS
- USN-4038-1
- USN-4038-1
- USN-4038-2
- USN-4038-2
- USN-4146-1
- USN-4146-1
- USN-4146-2
- USN-4146-2
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2024-11-21
CVE-2019-15961
A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.
- https://bugzilla.clamav.net/show_bug.cgi?id=12380
- https://bugzilla.clamav.net/show_bug.cgi?id=12380
- [debian-lts-announce] 20200218 [SECURITY] [DLA 2108-1] clamav security update
- [debian-lts-announce] 20200218 [SECURITY] [DLA 2108-1] clamav security update
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvr56010
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvr56010
- GLSA-202003-46
- GLSA-202003-46
- USN-4230-2
- USN-4230-2
Modified: 2024-11-21
CVE-2019-1785
A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.
Modified: 2024-11-21
CVE-2019-1786
A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
Modified: 2024-11-21
CVE-2019-1787
A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
- openSUSE-SU-2019:1210
- openSUSE-SU-2019:1210
- openSUSE-SU-2019:1208
- openSUSE-SU-2019:1208
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12181
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12181
- [debian-lts-announce] 20190422 [SECURITY] [DLA 1759-1] clamav security update
- [debian-lts-announce] 20190422 [SECURITY] [DLA 1759-1] clamav security update
- GLSA-201904-12
- GLSA-201904-12
Modified: 2024-11-21
CVE-2019-1788
A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.
- openSUSE-SU-2019:1210
- openSUSE-SU-2019:1210
- openSUSE-SU-2019:1208
- openSUSE-SU-2019:1208
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12166
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12166
- [debian-lts-announce] 20190422 [SECURITY] [DLA 1759-1] clamav security update
- [debian-lts-announce] 20190422 [SECURITY] [DLA 1759-1] clamav security update
- GLSA-201904-12
- GLSA-201904-12
Modified: 2024-11-21
CVE-2019-1789
ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.
Modified: 2024-11-21
CVE-2019-1798
A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
Modified: 2024-11-21
CVE-2020-3327
A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- [debian-lts-announce] 20200519 [SECURITY] [DLA 2215-1] clamav security update
- [debian-lts-announce] 20200519 [SECURITY] [DLA 2215-1] clamav security update
- [debian-lts-announce] 20200806 [SECURITY] [DLA 2314-1] clamav security update
- [debian-lts-announce] 20200806 [SECURITY] [DLA 2314-1] clamav security update
- FEDORA-2020-b0acd7b66e
- FEDORA-2020-b0acd7b66e
- FEDORA-2020-6584a641ae
- FEDORA-2020-6584a641ae
- FEDORA-2020-bca44487a1
- FEDORA-2020-bca44487a1
- FEDORA-2020-dd0c20d985
- FEDORA-2020-dd0c20d985
- FEDORA-2020-d98d2cbae1
- FEDORA-2020-d98d2cbae1
- GLSA-202007-23
- GLSA-202007-23
- USN-4370-1
- USN-4370-1
- USN-4370-2
- USN-4370-2
- USN-4435-1
- USN-4435-1
- USN-4435-2
- USN-4435-2
Modified: 2024-11-21
CVE-2020-3341
A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- [debian-lts-announce] 20200519 [SECURITY] [DLA 2215-1] clamav security update
- [debian-lts-announce] 20200519 [SECURITY] [DLA 2215-1] clamav security update
- FEDORA-2020-b0acd7b66e
- FEDORA-2020-b0acd7b66e
- FEDORA-2020-bca44487a1
- FEDORA-2020-bca44487a1
- FEDORA-2020-d98d2cbae1
- FEDORA-2020-d98d2cbae1
- USN-4370-1
- USN-4370-1
- USN-4370-2
- USN-4370-2