A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
                
            References
                    | Link | Resource | 
|---|---|
| https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html | Release Notes Vendor Advisory | 
| https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs59062 | Third Party Advisory | 
| https://security.gentoo.org/glsa/202003-46 | Third Party Advisory | 
| https://usn.ubuntu.com/4280-1/ | Third Party Advisory | 
| https://usn.ubuntu.com/4280-2/ | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2020-02-05 18:15
Updated : 2022-01-01 19:56
NVD link : CVE-2020-3123
Mitre link : CVE-2020-3123
CVE.ORG link : CVE-2020-3123
JSON object : View
Products Affected
                clamav
- clamav
canonical
- ubuntu_linux
CWE
                
                    
                        
                        CWE-125
                        
            Out-of-bounds Read
