2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2023-20032" ,
"sourceIdentifier" : "ykramarz@cisco.com" ,
"published" : "2023-03-01T08:15:11.907" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T07:40:23.950" ,
2023-10-01 12:00:27 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
2023-10-01 12:00:27 +00:00
"value" : "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.\r\n\r \r This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.\r\n\r For a description of this vulnerability, see the ClamAV blog [\"https://blog.clamav.net/\"]."
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-12-08 03:06:42 +00:00
"source" : "ykramarz@cisco.com" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
2024-12-08 03:06:42 +00:00
"source" : "ykramarz@cisco.com" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-120"
2023-04-24 12:24:31 +02:00
}
]
2024-01-25 19:00:44 +00:00
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-01-25 19:00:44 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-787"
2024-01-25 19:00:44 +00:00
}
]
2023-04-24 12:24:31 +02:00
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*" ,
"versionEndExcluding" : "1.20.2" ,
"matchCriteriaId" : "40572314-306A-4594-A279-216B8139B7A0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*" ,
"versionEndExcluding" : "1.21.1" ,
"matchCriteriaId" : "726A787E-E64F-4906-9BAE-4F79EB530F1F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*" ,
"versionEndExcluding" : "7.5.9" ,
"matchCriteriaId" : "C4F63447-CA0E-43FC-8FF1-B4032D21E32A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*" ,
"versionStartIncluding" : "8.0.1.21160" ,
"versionEndExcluding" : "8.1.5" ,
"matchCriteriaId" : "D0FC45E7-C4AB-4AC5-87AB-0ED1508CCFF3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.6.0" ,
"matchCriteriaId" : "07BFC8FC-6CF0-49DA-B4ED-5B7936A4233E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "12.5.6" ,
"matchCriteriaId" : "2EFF7AB1-33C6-4627-9950-2F2E48BCCC7E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.0.0" ,
"versionEndExcluding" : "14.0.4-005" ,
"matchCriteriaId" : "A8361D69-981F-4F28-86F9-EFF202C9E537"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.5.0" ,
"versionEndExcluding" : "14.5.1-013" ,
"matchCriteriaId" : "CF6E494A-FCA7-4569-847D-2AA3C14C3E79"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.0.0" ,
"versionEndExcluding" : "15.0.0-254" ,
"matchCriteriaId" : "BD8B1F66-9FD3-4970-BDA3-26241B18B4AA"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "0.103.7" ,
"matchCriteriaId" : "BDF08008-9C84-4075-8AB7-233209E4F3C0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "0.104.0" ,
"versionEndIncluding" : "0.105.1" ,
"matchCriteriaId" : "14FA7424-A3E5-4F46-83F8-E9767330F1CE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:clamav:clamav:1.0.0:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "A381BD3C-88E0-41FD-91E6-26BCF78B84CA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:clamav:clamav:1.0.0:rc:*:*:*:*:*:*" ,
"matchCriteriaId" : "88BE0B1C-4515-40EA-ADDD-A04BF50743DA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:clamav:clamav:1.0.0:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "FB00FEFE-F8A2-482D-A7EE-002DA4E10FF6"
}
]
}
]
2023-07-19 02:01:21 +00:00
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "3.0.0" ,
"versionEndExcluding" : "3.7.35" ,
"matchCriteriaId" : "88CF061E-FFD8-48DE-887F-2119C916E2B4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "3.8.0" ,
"versionEndExcluding" : "3.11.23" ,
"matchCriteriaId" : "F499B698-4EB6-4262-BAF4-9BDE7F114805"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.3.0" ,
"versionEndExcluding" : "4.3.17" ,
"matchCriteriaId" : "40519377-ECDC-41E2-B6A6-7F601AC28ACD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.4.0" ,
"versionEndExcluding" : "4.6.4" ,
"matchCriteriaId" : "77BAC9BA-B215-490F-9202-617B1B4E7C8A"
}
]
}
]
2023-04-24 12:24:31 +02:00
}
] ,
"references" : [
{
"url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy" ,
"source" : "ykramarz@cisco.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}