ClamAV < 0.103.8 / 0.104.x < 0.105.2 / 1.0.0 Multiple Vulnerabilities

critical Nessus Plugin ID 172281

Synopsis

The antivirus service running on the remote host is affected by multiple vulnerabilities.

Description

According to its version, the ClamAV clamd antivirus daemon running on the remote host is prior to 0.103.8, 0.104.x prior to 0.105.2, or 1.0.0. It is, therefore, affected by multiple vulnerabilities:

- A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code. (CVE-2023-20032)

- A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device.
(CVE-2023-20052)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to ClamAV version 0.103.8, 0.105.2, or 1.0.1 or later.

See Also

https://blog.clamav.net/2023/02/clamav-01038-01052-and-101-patch.html

Plugin Details

Severity: Critical

ID: 172281

File Name: clamav_1_0_1.nasl

Version: 1.2

Type: remote

Family: Misc.

Published: 3/8/2023

Updated: 8/31/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-20032

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:clamav:clamav

Required KB Items: installed_sw/ClamAV

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/3/2023

Vulnerability Publication Date: 1/3/2023

Reference Information

CVE: CVE-2023-20032, CVE-2023-20052