Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2022.0187
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2022-0187)
Zusammenfassung:The remote host is missing an update for the 'clamav' package(s) announced via the MGASA-2022-0187 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'clamav' package(s) announced via the MGASA-2022-0187 advisory.

Vulnerability Insight:
Infinite loop vulnerability in the CHM file parser. Issue affects versions
0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions.
(CVE-2022-20770)

Infinite loop vulnerability in the TIFF file parser. Issue affects versions
0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions. The
issue only occurs if the '--alert-broken-media' ClamScan option is enabled.
For ClamD, the affected option is 'AlertBrokenMedia yes', and for libclamav
it is the 'CL_SCAN_HEURISTIC_BROKEN_MEDIA' scan option. (CVE-2022-20771)

Memory leak in the HTML file parser / Javascript normalizer. Issue affects
versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior
versions. (CVE-2022-20785)

Multi-byte heap buffer overflow write vulnerability in the signature
database load module. The fix was to update the vendored regex library to
the latest version. Issue affects versions 0.104.0 through 0.104.2 and LTS
version 0.103.5 and prior versions. (CVE-2022-20792)

NULL-pointer dereference crash in the scan verdict cache check. Issue
affects versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2. (CVE-2022-20796)

Affected Software/OS:
'clamav' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2022-20770
Cisco Security Advisory: 20220504 ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-prVGcHLd
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4NNBIJVG6Z4PDIKUZXTYXICYUAYAZ56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BX5ZXNHP4NFYQ5BFSKY3WT7NTBZUYG7L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RV6BLIATIJE74SQ6NG5ZC4JK5MMDQ2R/
https://security.gentoo.org/glsa/202310-01
https://lists.debian.org/debian-lts-announce/2022/06/msg00004.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-20771
Cisco Security Advisory: 20220504 ClamAV TIFF File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-ZAZBwRVG
Common Vulnerability Exposure (CVE) ID: CVE-2022-20785
Cisco Security Advisory: 20220504 ClamAV HTML Scanning Memory Leak Vulnerability Affecting Cisco Products: April 2022
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-html-XAuOK8mR
Common Vulnerability Exposure (CVE) ID: CVE-2022-20792
Cisco Security Advisory: https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html
https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-20796
Cisco Security Advisory: 20220504 ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: April 2022
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-vL9x58p4
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.