A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources. For a description of this vulnerability, see the ClamAV blog .
History

Thu, 07 Nov 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2024-02-07T16:16:00.975Z

Updated: 2024-11-07T20:23:12.944Z

Reserved: 2023-11-08T15:08:07.627Z

Link: CVE-2024-20290

cve-icon Vulnrichment

Updated: 2024-08-01T21:59:41.158Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-07T17:15:10.517

Modified: 2024-02-15T15:43:27.240

Link: CVE-2024-20290

cve-icon Redhat

No data.