CVE-2022-20792
Summary
| CVE | CVE-2022-20792 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-08-10 09:15:00 UTC |
| Updated | 2023-10-01 11:15:00 UTC |
| Description | A vulnerability in the regex module used by the signature database load module of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an authenticated, local attacker to crash ClamAV at database load time, and possibly gain code execution. The vulnerability is due to improper bounds checking that may result in a multi-byte heap buffer overwflow write. An attacker could exploit this vulnerability by placing a crafted CDB ClamAV signature database file in the ClamAV database directory. An exploit could allow the attacker to run code as the clamav user. |
Risk And Classification
Problem Types: CWE-787
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| ClamAV® blog: ClamAV 0.105.0, 0.104.3, 0.103.6 released | CISCO | blog.clamav.net | |
| ClamAV: Multiple Vulnerabilities (GLSA 202310-01) — Gentoo security | GENTOO | security.gentoo.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 179350 Debian Security Update for clamav (DLA 3042-1)
- 180857 Debian Security Update for clamav (CVE-2022-20792)
- 198788 Ubuntu Security Notification for ClamAV Vulnerabilities (USN-5423-1)
- 500101 Alpine Linux Security Update for clamav
- 690872 Free Berkeley Software Distribution (FreeBSD) Security Update for clamav (b2407db1-d79f-11ec-a15f-589cfc0f81b0)
- 710761 Gentoo Linux ClamAV Multiple Vulnerabilities (GLSA 202310-01)
- 752118 SUSE Enterprise Linux Security Update for clamav (SUSE-SU-2022:1644-1)
- 752121 SUSE Enterprise Linux Security Update for clamav (SUSE-SU-2022:1647-1)