NA

CVE-2023-20212

Published: 18/08/2023 Updated: 25/01/2024
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the malicious user to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco secure endpoint private cloud

cisco secure endpoint

Vendor Advisories

Debian Bug report logs - #1050057 clamav: CVE-2023-20197 CVE-2023-20212 Package: src:clamav; Maintainer for src:clamav is ClamAV Team <pkg-clamav-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 19 Aug 2023 04:39:02 UTC Severity: important Tags: security, upstream Foun ...
A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device This vulnerability is due to a logic error in the memory management of an affected device An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned ...