6.3
CVSSv3

CVE-2020-3350

Published: 18/06/2020 Updated: 07/11/2023
CVSS v2 Base Score: 3.3 | Impact Score: 4.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 6.3 | Impact Score: 5.2 | Exploitability Score: 1
VMScore: 294
Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Summary

A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local malicious user to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the malicious user to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco advanced malware protection for endpoints

cisco clam antivirus

fedoraproject fedora 31

fedoraproject fedora 32

debian debian linux 9.0

canonical ubuntu linux 18.04

canonical ubuntu linux 14.04

canonical ubuntu linux 20.04

canonical ubuntu linux 16.04

canonical ubuntu linux 12.04

Vendor Advisories

Fixed a vulnerability in the ARJ archive-parsing module in ClamAV 01023 that could cause a denial-of-service (DoS) condition Improper bounds checking resulted in an out-of-bounds read that could cause a crash The previous fix for this CVE in version 01023 was incomplete This fix correctly resolves the issue (CVE-2020-3327) Fixed a vulnerabi ...
A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system The vulnerability is due to a race condition that could occur when scanning malicious files An attacker with local shell access could exploit this ...