cvelist/2024/20xxx/CVE-2024-20290.json

256 lines
12 KiB
JSON
Raw Normal View History

2023-11-08 16:00:37 +00:00
{
2024-02-07 17:00:35 +00:00
"data_version": "4.0",
2023-11-08 16:00:37 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-20290",
2024-02-07 17:00:35 +00:00
"ASSIGNER": "psirt@cisco.com",
"STATE": "PUBLIC"
2023-11-08 16:00:37 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-02-07 17:00:35 +00:00
"value": "A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources.\r\n\r For a description of this vulnerability, see the ClamAV blog ."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Buffer Over-read",
"cweId": "CWE-126"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Cisco",
"product": {
"product_data": [
{
"product_name": "Cisco Secure Endpoint",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "6.0.9"
},
{
"version_affected": "=",
"version_value": "6.0.7"
},
{
"version_affected": "=",
"version_value": "6.1.5"
},
{
"version_affected": "=",
"version_value": "6.1.7"
},
{
"version_affected": "=",
"version_value": "6.1.9"
},
{
"version_affected": "=",
"version_value": "6.2.1"
},
{
"version_affected": "=",
"version_value": "6.2.5"
},
{
"version_affected": "=",
"version_value": "6.2.19"
},
{
"version_affected": "=",
"version_value": "6.2.3"
},
{
"version_affected": "=",
"version_value": "6.2.9"
},
{
"version_affected": "=",
"version_value": "6.3.5"
},
{
"version_affected": "=",
"version_value": "6.3.1"
},
{
"version_affected": "=",
"version_value": "6.3.7"
},
{
"version_affected": "=",
"version_value": "6.3.3"
},
{
"version_affected": "=",
"version_value": "7.0.5"
},
{
"version_affected": "=",
"version_value": "7.1.1"
},
{
"version_affected": "=",
"version_value": "7.1.5"
},
{
"version_affected": "=",
"version_value": "7.2.13"
},
{
"version_affected": "=",
"version_value": "7.2.7"
},
{
"version_affected": "=",
"version_value": "7.2.3"
},
{
"version_affected": "=",
"version_value": "7.2.11"
},
{
"version_affected": "=",
"version_value": "7.2.5"
},
{
"version_affected": "=",
"version_value": "7.3.1"
},
{
"version_affected": "=",
"version_value": "7.3.9"
},
{
"version_affected": "=",
"version_value": "7.3.3"
},
{
"version_affected": "=",
"version_value": "7.3.5"
},
{
"version_affected": "=",
"version_value": "8.1.7"
},
{
"version_affected": "=",
"version_value": "8.1.5"
},
{
"version_affected": "=",
"version_value": "8.1.3.21242"
},
{
"version_affected": "=",
"version_value": "8.1.7.21512"
},
{
"version_affected": "=",
"version_value": "8.1.3"
},
{
"version_affected": "=",
"version_value": "8.1.5.21322"
},
{
"version_affected": "=",
"version_value": "8.1.7.21417"
}
]
}
},
{
"product_name": "Cisco Secure Endpoint Private Cloud Administration Portal",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "N/A"
}
]
}
},
{
"product_name": "Cisco Secure Endpoint Private Cloud Console",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "N/A"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-hDffu6t",
"refsource": "MISC",
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-hDffu6t"
2024-02-13 03:00:35 +00:00
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6MUDUPAHAAV6FPB2C2QIQCFJ4SHYBOTY/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6MUDUPAHAAV6FPB2C2QIQCFJ4SHYBOTY/"
2024-02-14 04:00:34 +00:00
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FXZYVDNV66RNMNVJOHAJAYRZV4U64CQ/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FXZYVDNV66RNMNVJOHAJAYRZV4U64CQ/"
2024-02-07 17:00:35 +00:00
}
]
},
"source": {
"advisory": "cisco-sa-clamav-hDffu6t",
"discovery": "INTERNAL",
"defects": [
"CSCwh88483",
"CSCwh88484"
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
2023-11-08 16:00:37 +00:00
}
]
}
}