CVE-2022-20796
Published May 4, 2022
Last updated a year ago
Overview
- Description
- On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in Clam AntiVirus (ClamAV) versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2 could allow an authenticated, local attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.9
- Impact score
- 6.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:C
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:clamav:clamav:0.103.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C58DDEC-8869-4D04-88DA-B76E394E0C17" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.103.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1E5521F-C8F7-4547-A441-E828F60F2C93" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.104.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E787093-A226-4CFB-9D3A-208FE9F085E1" }, { "criteria": "cpe:2.3:a:clamav:clamav:0.104.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6585F37B-2DB2-407D-B801-2E54B95FFCAD" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*", "vulnerable": true, "matchCriteriaId": "2D18B72E-A39C-4355-880C-D8F56F69DEC1", "versionEndExcluding": "1.16.3" }, { "criteria": "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*", "vulnerable": true, "matchCriteriaId": "7EB9082D-A730-4BC0-A7C3-FD41C9B90C62", "versionEndExcluding": "1.17.2" }, { "criteria": "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "941865DD-D900-4FF7-B94B-8A4849653E01", "versionEndExcluding": "7.5.5" }, { "criteria": "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*", "vulnerable": true, "matchCriteriaId": "F3E65C72-96CF-445D-9A4C-ED82ED79882E", "versionEndExcluding": "1.18.2", "versionStartIncluding": "1.18.0" }, { "criteria": "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*", "vulnerable": true, "matchCriteriaId": "30810C03-D9F9-4CD2-B276-11E9302F245C", "versionEndExcluding": "1.18.2", "versionStartIncluding": "1.18.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252" } ], "operator": "OR" } ] } ]