发布时间: 2023年8月26日
修改时间: 2024年10月31日
A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources. For a description of this vulnerability, see the ClamAV blog .
NVD | openEuler | |
---|---|---|
Confidentiality | None | None |
Attack Vector | Network | Network |
CVSS评分 | 7.5 | 7.5 |
Attack Complexity | Low | Low |
Privileges Required | None | None |
Scope | Unchanged | Unchanged |
Integrity | None | None |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1645 | clamav security update | 2023年9月2日 |
KylinSec-SA-2023-1650 | clamav security update | 2023年9月2日 |
KylinSec-SA-2023-1670 | clamav security update | 2023年9月2日 |
KylinSec-SA-2023-2242 | clamav security update | 2023年9月2日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | clamav | Fixed |
KY3.4-5A | clamav | Fixed |
KY3.5.1 | clamav | Fixed |
KY3.5.2 | clamav | Fixed |