5.5
CVSSv3

CVE-2018-0202

Published: 27/03/2018 Updated: 26/03/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

clamscan in ClamAV prior to 0.99.4 contains a vulnerability that could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause an out-of-bounds read when ClamAV scans the malicious file, allowing the malicious user to cause a DoS condition. This concerns pdf_parse_array and pdf_parse_string in libclamav/pdfng.c. Cisco Bug IDs: CSCvh91380, CSCvh91400.

Vulnerable Product Search on Vulmon Subscribe to Product

clamav clamav

canonical ubuntu linux 14.04

canonical ubuntu linux 17.10

canonical ubuntu linux 12.04

canonical ubuntu linux 16.04

debian debian linux 7.0

Vendor Advisories

Several security issues were fixed in ClamAV ...
Several security issues were fixed in ClamAV ...
Heap-based buffer overflow in mspack/lzxdcmspack/lzxdc in libmspack 05alpha, as used in ClamAV 0992, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted CHM file (CVE-2017-6419) Out-of-bounds access in the PDF parser (CVE-2018-0202) A V ...
A heap overflow has been discovered in ClamAv before 0994 in pdf_parse_string possibly leading to arbitrary code execution by inspecting a specially crafted PDF file ...

Github Repositories

Security & Privacy in Computing(Fall 2018), Final Group Project at JHUISI, clamscan vulnerability in Cisco's ClamAV 0.99.3

CVE-2018-0202 Security & Privacy in Computing(Fall 2018) Final Group Project, clamscan vulnerability in Cisco's ClamAV 0993 Members: Jay Chow, Harry Luo, Benfang Wang, Johns Hopkins University Information Security Institute Detailed steps on how we installed this vulnerable version of ClamAV 0933: 1)From wwwclamavnet/downloads, we scrolled down and we