clamav: Vulnerability in the Data-Loss-Prevention (DLP) module

Related Vulnerabilities: CVE-2020-3123  

Debian Bug report logs - #950944
clamav: Vulnerability in the Data-Loss-Prevention (DLP) module

version graph

Reported by: Scott Kitterman <debian@kitterman.com>

Date: Sat, 8 Feb 2020 16:09:03 UTC

Severity: important

Tags: security, upstream

Found in versions clamav/0.102.1+dfsg-0+deb9u2, clamav/0.102.1+dfsg-3, clamav/0.102.1+dfsg-0+deb10u2

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, ClamAV Team <pkg-clamav-devel@lists.alioth.debian.org>:
Bug#950944; Package clamav. (Sat, 08 Feb 2020 16:09:05 GMT) (full text, mbox, link).


Acknowledgement sent to Scott Kitterman <debian@kitterman.com>:
New Bug report received and forwarded. Copy sent to ClamAV Team <pkg-clamav-devel@lists.alioth.debian.org>. (Sat, 08 Feb 2020 16:09:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Scott Kitterman <debian@kitterman.com>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: clamav: Vulnerability in the Data-Loss-Prevention (DLP) module
Date: Sat, 08 Feb 2020 11:07:12 -0500
Package: clamav
Version: 0.102.1+dfsg-0+deb10u2
Severity: important
Tags: upstream

CVE-2020-3123

A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus
(ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated,
remote attacker to cause a denial of service condition on an affected device.
The vulnerability is due to an out-of-bounds read affecting users that have
enabled the optional DLP feature. An attacker could exploit this vulnerability
by sending a crafted email file to an affected device. An exploit could allow
the attacker to cause the ClamAV scanning process crash, resulting in a denial
of service condition.

Fixed in 0.102.2.



Added tag(s) security. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 08 Feb 2020 16:24:02 GMT) (full text, mbox, link).


Marked as found in versions clamav/0.102.1+dfsg-0+deb9u2. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 08 Feb 2020 16:24:03 GMT) (full text, mbox, link).


Marked as found in versions clamav/0.102.1+dfsg-3. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 08 Feb 2020 16:24:03 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sun Feb 9 06:23:23 2020; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.