7.5
CVSSv3

CVE-2021-1405

Published: 08/04/2021 Updated: 05/08/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A vulnerability in the email parsing module in Clam AntiVirus (ClamAV) Software version 0.103.1 and all prior versions could allow an unauthenticated, remote malicious user to cause a denial of service condition on an affected device. The vulnerability is due to improper variable initialization that may result in an NULL pointer read. An attacker could exploit this vulnerability by sending a crafted email to an affected device. An exploit could allow the malicious user to cause the ClamAV scanning process crash, resulting in a denial of service condition.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

clamav clamav

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #986622 ClamAV 01032 security patch release Package: clamav; Maintainer for clamav is ClamAV Team <pkg-clamav-devel@listsaliothdebianorg>; Source for clamav is src:clamav (PTS, buildd, popcon) Reported by: Ralf Hildebrandt <RalfHildebrandt@charitede> Date: Thu, 8 Apr 2021 08:27:02 UTC ...
A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 01030 and 01031 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read An attacker could exploit this ...