cve/2019/CVE-2019-1785.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-1785](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1785)
![](https://img.shields.io/static/v1?label=Product&message=ClamAV&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=0.101.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=0.101.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brightgreen)
2024-05-26 14:27:05 +02:00
### Description
A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.
### POC
#### Reference
- https://bugzilla.clamav.net/show_bug.cgi?id=12284
#### Github
No PoCs found on GitHub currently.