{"api_version":"1","generated_at":"2026-04-23T04:11:23+00:00","cve":"CVE-2022-20698","urls":{"html":"https://cve.report/CVE-2022-20698","api":"https://cve.report/api/cve/CVE-2022-20698.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-20698","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-20698"},"summary":{"title":"CVE-2022-20698","description":"A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 0.104.1 and LTS version 0.103.4 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper checks that may result in an invalid pointer read. An attacker could exploit this vulnerability by sending a crafted OOXML file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.","state":"PUBLIC","assigner":"psirt@cisco.com","published_at":"2022-01-14 06:15:00","updated_at":"2023-10-01 11:15:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://security.gentoo.org/glsa/202310-01","name":"GLSA-202310-01","refsource":"GENTOO","tags":[],"title":"ClamAV: Multiple Vulnerabilities (GLSA 202310-01) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://blog.clamav.net/2022/01/clamav-01035-and-01042-security-patch.html","name":"https://blog.clamav.net/2022/01/clamav-01035-and-01042-security-patch.html","refsource":"CISCO","tags":[],"title":"ClamAV® blog: ClamAV 0.103.5 and 0.104.2 security patch release; 0.102 past EOL","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-20698","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-20698","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"20698","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"14.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"esm","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"20698","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"16.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"esm","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"20698","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"18.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"20698","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"20.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"20698","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"20.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"20698","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"21.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"20698","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"clamav","cpe5":"clamav","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"20698","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"clamav","cpe5":"clamav","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"20698","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"20698","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"20698","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-20698","qid":"179213","title":"Debian Security Update for clamav (CVE-2022-20698)"},{"cve":"CVE-2022-20698","qid":"198636","title":"Ubuntu Security Notification for ClamAV Vulnerability (USN-5233-1)"},{"cve":"CVE-2022-20698","qid":"354308","title":"Amazon Linux Security Advisory for clamav : ALAS2022-2022-090"},{"cve":"CVE-2022-20698","qid":"354456","title":"Amazon Linux Security Advisory for clamav : ALAS2022-2022-229"},{"cve":"CVE-2022-20698","qid":"354498","title":"Amazon Linux Security Advisory for clamav : ALAS2022-2022-063"},{"cve":"CVE-2022-20698","qid":"354544","title":"Amazon Linux Security Advisory for clamav : ALAS-2022-229"},{"cve":"CVE-2022-20698","qid":"355183","title":"Amazon Linux Security Advisory for clamav : ALAS2023-2023-052"},{"cve":"CVE-2022-20698","qid":"500101","title":"Alpine Linux Security Update for clamav"},{"cve":"CVE-2022-20698","qid":"502044","title":"Alpine Linux Security Update for clamav"},{"cve":"CVE-2022-20698","qid":"504621","title":"Alpine Linux Security Update for clamav"},{"cve":"CVE-2022-20698","qid":"690771","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for clamav (2a6106c6-73e5-11ec-8fa2-0800270512f4)"},{"cve":"CVE-2022-20698","qid":"710761","title":"Gentoo Linux ClamAV Multiple Vulnerabilities (GLSA 202310-01)"},{"cve":"CVE-2022-20698","qid":"751639","title":"SUSE Enterprise Linux Security Update for clamav (SUSE-SU-2022:0160-1)"},{"cve":"CVE-2022-20698","qid":"751694","title":"SUSE Enterprise Linux Security Update for clamav (SUSE-SU-2022:0358-1)"},{"cve":"CVE-2022-20698","qid":"751726","title":"SUSE Enterprise Linux Security Update for clamav (SUSE-SU-2022:0493-1)"},{"cve":"CVE-2022-20698","qid":"751744","title":"OpenSUSE Security Update for clamav (openSUSE-SU-2022:0493-1)"},{"cve":"CVE-2022-20698","qid":"753141","title":"SUSE Enterprise Linux Security Update for clamav (SUSE-SU-2022:14882-1)"},{"cve":"CVE-2022-20698","qid":"900525","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for clamav (7490)"},{"cve":"CVE-2022-20698","qid":"901602","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for clamav (7532-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"psirt@cisco.com","DATE_PUBLIC":"2022-01-13T00:00:00","ID":"CVE-2022-20698","STATE":"PUBLIC","TITLE":"Clam AntiVirus (ClamAV) Denial of Service Vulnerability"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"ClamAV","version":{"version_data":[{"version_affected":"<","version_value":"0.103.5"}]}},{"product_name":"ClamAV","version":{"version_data":[{"version_affected":"<","version_value":"0.104.2"}]}}]},"vendor_name":"Cisco"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 0.104.1 and LTS version 0.103.4 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper checks that may result in an invalid pointer read. An attacker could exploit this vulnerability by sending a crafted OOXML file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition."}]},"exploit":[{"lang":"eng","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "}],"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-20"}]}]},"references":{"reference_data":[{"name":"https://blog.clamav.net/2022/01/clamav-01035-and-01042-security-patch.html","refsource":"CISCO","url":"https://blog.clamav.net/2022/01/clamav-01035-and-01042-security-patch.html"},{"refsource":"GENTOO","name":"GLSA-202310-01","url":"https://security.gentoo.org/glsa/202310-01"}]},"source":{"advisory":"clamav-01035-and-01042-security-patch","discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-01-14 06:15:00","lastModifiedDate":"2023-10-01 11:15:00","problem_types":["CWE-125"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*","versionStartIncluding":"0.104.0","versionEndExcluding":"0.104.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:clamav:clamav:*:*:*:*:lts:*:*:*","versionEndExcluding":"0.103.5","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"20698","Ordinal":"220043","Title":"CVE-2022-20698","CVE":"CVE-2022-20698","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"20698","Ordinal":"1","NoteData":"A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 0.104.1 and LTS version 0.103.4 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper checks that may result in an invalid pointer read. An attacker could exploit this vulnerability by sending a crafted OOXML file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.","Type":"Description","Title":null},{"CveYear":"2022","CveId":"20698","Ordinal":"2","NoteData":"2022-01-14","Type":"Other","Title":"Published"},{"CveYear":"2022","CveId":"20698","Ordinal":"3","NoteData":"2022-01-14","Type":"Other","Title":"Modified"}]}}}