7.5
CVSSv3

CVE-2020-3327

Published: 13/05/2020 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote malicious user to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the malicious user to cause the ClamAV scanning process crash, resulting in a denial of service condition.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco clam antivirus

debian debian linux 8.0

debian debian linux 9.0

fedoraproject fedora 30

fedoraproject fedora 31

fedoraproject fedora 32

canonical ubuntu linux 18.04

canonical ubuntu linux 14.04

canonical ubuntu linux 19.10

canonical ubuntu linux 20.04

canonical ubuntu linux 16.04

canonical ubuntu linux 12.04

Vendor Advisories

Several security issues were fixed in ClamAV ...
Several security issues were fixed in ClamAV ...
Fixed a vulnerability in the ARJ archive-parsing module in ClamAV 01023 that could cause a denial-of-service (DoS) condition Improper bounds checking resulted in an out-of-bounds read that could cause a crash The previous fix for this CVE in version 01023 was incomplete This fix correctly resolves the issue (CVE-2020-3327) Fixed a vulnerabi ...