A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files. The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.
History

Thu, 12 Sep 2024 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Clamav
Clamav clamav
Weaknesses CWE-754
CPEs cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:1.4.0:*:*:*:*:*:*:*
Vendors & Products Clamav
Clamav clamav

Thu, 05 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Sep 2024 21:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files. The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.
Title ClamAV Privilege Handling Escalation Vulnerability
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2024-09-04T21:28:54.812Z

Updated: 2024-09-05T13:34:52.623Z

Reserved: 2023-11-08T15:08:07.688Z

Link: CVE-2024-20506

cve-icon Vulnrichment

Updated: 2024-09-05T13:34:48.494Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-04T22:15:04.083

Modified: 2024-09-12T17:26:37.643

Link: CVE-2024-20506

cve-icon Redhat

No data.