diff options
author | Yasuhiro Kimura <yasu@FreeBSD.org> | 2024-02-07 23:16:11 +0000 |
---|---|---|
committer | Yasuhiro Kimura <yasu@FreeBSD.org> | 2024-02-08 05:18:12 +0000 |
commit | 22073304c7a88d8cb06667d73d2385a6b21da91e (patch) | |
tree | cfdee02d016f559f80147c9bc3fd82233952dd1e /security | |
parent | e9626d04ff33d3953bd15b9fc82b27a3c97064a5 (diff) | |
download | ports-22073304c7a88d8cb06667d73d2385a6b21da91e.tar.gz ports-22073304c7a88d8cb06667d73d2385a6b21da91e.zip |
security/vuxml: Document multiple vulnerabilities in clamav
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln/2024.xml | 58 |
1 files changed, 58 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index fa21c5d8aeb8..4bb0b9c5e77d 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,61 @@ + <vuln vid="68ae70c5-c5e5-11ee-9768-08002784c58d"> + <topic>clamav -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>clamav</name> + <range><lt>1.2.2,1</lt></range> + </package> + <package> + <name>clamav-lts</name> + <range><lt>1.0.5,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The ClamAV project reports:</p> + <blockquote cite="https://blog.clamav.net/2023/11/clamav-130-122-105-released.html"> + <dl> + <dt>CVE-2024-20290</dt> + <dd> + A vulnerability in the OLE2 file format parser of ClamAV + could allow an unauthenticated, remote attacker to cause + a denial of service (DoS) condition on an affected + device. This vulnerability is due to an incorrect check + for end-of-string values during scanning, which may + result in a heap buffer over-read. An attacker could + exploit this vulnerability by submitting a crafted file + containing OLE2 content to be scanned by ClamAV on an + affected device. A successful exploit could allow the + attacker to cause the ClamAV scanning process to + terminate, resulting in a DoS condition on the affected + software and consuming available system resources. + </dd> + <dt>CVE-2024-20328</dt> + <dd> + Fixed a possible command injection vulnerability in the + "VirusEvent" feature of ClamAV's ClamD + service. To fix this issue, we disabled the '%f' format + string parameter. ClamD administrators may continue to + use the `CLAM_VIRUSEVENT_FILENAME` environment variable, + instead of '%f'. But you should do so only from within + an executable, such as a Python script, and not directly + in the clamd.conf "VirusEvent" command. + </dd> + </dl> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-20290</cvename> + <cvename>CVE-2024-20328</cvename> + <url>https://blog.clamav.net/2023/11/clamav-130-122-105-released.html</url> + </references> + <dates> + <discovery>2024-02-07</discovery> + <entry>2024-02-07</entry> + </dates> + </vuln> + <vuln vid="e0f6215b-c59e-11ee-a6db-080027a5b8e9"> <topic>Django -- multiple vulnerabilities</topic> <affects> |