5
CVSSv2

CVE-2020-3481

Published: 20/07/2020 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote malicious user to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the malicious user to cause the ClamAV scanning process crash, resulting in a denial of service condition.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

clamav clamav

debian debian linux 9.0

canonical ubuntu linux 18.04

canonical ubuntu linux 14.04

fedoraproject fedora 31

fedoraproject fedora 32

canonical ubuntu linux 20.04

canonical ubuntu linux 16.04

canonical ubuntu linux 12.04

Vendor Advisories

Fixed a vulnerability in the ARJ archive-parsing module in ClamAV 01023 that could cause a denial-of-service (DoS) condition Improper bounds checking resulted in an out-of-bounds read that could cause a crash The previous fix for this CVE in version 01023 was incomplete This fix correctly resolves the issue (CVE-2020-3327) Fixed a vulnerabi ...