• CVE-2024-20506

发布时间: 2024年9月14日

修改时间: 2024年10月9日

概要

A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files.The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.

CVSS v3 指标

NVD openEuler
CVSS评分 6.1 6.1
Attack Vector Local Local
Attack Complexity Low Low
Privileges Required Low Low
User Interaction None None
Scope Unchanged Unchanged
Confidentiality None None
Integrity Low Low
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-3870 clamav security update 2024年9月14日

影响产品

产品 状态
KY3.4-5A clamav Fixed
KY3.5.2 clamav Fixed
V6 clamav Fixed