QID 354308

Date Published: 2022-12-21

QID 354308: Amazon Linux Security Advisory for clamav : ALAS2022-2022-090

a vulnerability in the ooxml parsing module in clam antivirus (clamav) software version 0.104.1 and lts version 0.103.4 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.
The vulnerability is due to improper checks that may result in an invalid pointer read.
An attacker could exploit this vulnerability by sending a crafted ooxml file to an affected device.
An exploit could allow the attacker to cause the clamav scanning process to crash, resulting in a denial of service condition. (
( CVE-2022-20698) on april 20, 2022, the following vulnerability in the clamav scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: a vulnerability in chm file parser of clam antivirus (clamav) versions 0.104.0 through 0.104.2 and lts version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.
For a description of this vulnerability, see the clamav blog.
This advisory will be updated as additional information becomes available. (
( CVE-2022-20770) on april 20, 2022, the following vulnerability in the clamav scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: a vulnerability in the tiff file parser of clam antivirus (clamav) versions 0.104.0 through 0.104.2 and lts version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.
For a description of this vulnerability, see the clamav blog. (
( CVE-2022-20796)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as High - 7.8 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2022-2022-090 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2022-2022-090 amazon linux 2022 URL Logo alas.aws.amazon.com/AL2022/ALAS-2022-090.html