Impact
A defect in the CSS handling component of ClamAV leads to improper error handling when splitting UTF-8 strings. When a maliciously crafted HTML file is scanned, this flaw can terminate the scanning process, resulting in a denial of service on the affected device. The vulnerability is a classic example of CWE-248, undefined behavior caused by improper handling of error conditions.
Affected Systems
The flaw is reported to affect Cisco Secure Endpoint devices that rely on ClamAV for scanning. No specific version range is supplied in the advisory, so any deployment of ClamAV within this product line should be treated with caution until a patch can be applied.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity. The EPSS score is less than 1%, suggesting that exploitation is unlikely at present, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an unauthenticated attacker to provide a crafted HTML file that ClamAV will process, a condition that may arise if the device accepts arbitrary user-supplied content for scanning.
OpenCVE Enrichment