CVE-2024-20290

A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources. For a description of this vulnerability, see the ClamAV blog .
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*
cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*
cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-02-07 17:15

Updated : 2024-02-15 15:43


NVD link : CVE-2024-20290

Mitre link : CVE-2024-20290

CVE.ORG link : CVE-2024-20290


JSON object : View

Products Affected

fedoraproject

  • fedora

cisco

  • secure_endpoint_private_cloud
  • secure_endpoint
CWE
CWE-125

Out-of-bounds Read

CWE-126

Buffer Over-read