140 lines
4.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2021-1404",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2021-04-08T05:15:13.267",
"lastModified": "2022-08-05T17:18:28.780",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el m\u00f3dulo de an\u00e1lisis de PDF en el Software Clam AntiVirus (ClamAV) versiones 0.103.0 y 0.103.1, podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio en un dispositivo afectado. La vulnerabilidad es debido a un seguimiento inapropiado del tama\u00f1o del b\u00fafer que puede resultar en una lectura excesiva del b\u00fafer de la pila. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un archivo PDF dise\u00f1ado a un dispositivo afectado. Una explotaci\u00f3n podr\u00eda permitir al atacante causar que el proceso de escaneo de ClamAV se bloquee, resultando en una condici\u00f3n de denegaci\u00f3n de servicio"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clamav:clamav:0.103.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C776BACB-EE82-4BE9-86C9-C20732E42E7F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clamav:clamav:0.103.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D1E389C4-E99E-464E-9466-02204167FEB4"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html",
"source": "ykramarz@cisco.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}