Bug 1961572 (CVE-2021-1405) - CVE-2021-1405 clamav: denial of service in the PDF parsing module
Summary: CVE-2021-1405 clamav: denial of service in the PDF parsing module
Keywords:
Status: NEW
Alias: CVE-2021-1405
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 1961573 1961574 1961711
Blocks: 1961575
TreeView+ depends on / blocked
 
Reported: 2021-05-18 10:05 UTC by Marian Rehak
Modified: 2023-07-07 08:33 UTC (History)
12 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in clamav. The email parsing module could allow an unauthenticated, remote attacker to cause a denial of service condition due to improper variable initialization that may result in an NULL pointer read. The highest threat from this vulnerability is to system availability.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Marian Rehak 2021-05-18 10:05:51 UTC
A vulnerability in the email parsing module in Clam AntiVirus (ClamAV) Software version 0.103.1 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper variable initialization that may result in an NULL pointer read. An attacker could exploit this vulnerability by sending a crafted email to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.

https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00012.html
https://security.gentoo.org/glsa/202104-07

Comment 1 Marian Rehak 2021-05-18 10:06:35 UTC
Created clamav tracking bugs for this issue:

Affects: epel-all [bug 1961574]
Affects: fedora-all [bug 1961573]

Comment 3 Sergio Basto 2021-05-18 20:03:05 UTC
(In reply to Marian Rehak from comment #0)
> A vulnerability in the email parsing module in Clam AntiVirus (ClamAV)
> Software version 0.103.1 and all prior versions could allow an
> unauthenticated, remote attacker to cause a denial of service condition on
> an affected device. The vulnerability is due to improper variable
> initialization that may result in an NULL pointer read. An attacker could
> exploit this vulnerability by sending a crafted email to an affected device.
> An exploit could allow the attacker to cause the ClamAV scanning process
> crash, resulting in a denial of service condition.
> 
> https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html

https://src.fedoraproject.org/rpms/clamav  [1]  all branches are already updated 


                  Stable version	Version in testing
Fedora 35	clamav-0.103.2-1.fc35	
Fedora 34	clamav-0.103.2-1.fc34	
Fedora 33	clamav-0.103.2-1.fc33	
Fedora 32	clamav-0.103.2-1.fc32	
Fedora EPEL 8	clamav-0.103.2-1.el8	
Fedora EPEL 7	clamav-0.103.2-1.el7	
Fedora ELN	clamav-0.103.2-1.eln110


Note You need to log in before you can comment on or make changes to this bug.