Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2019-12625
Vulnerability from cvelistv5
Published
2019-11-05 18:15
Modified
2024-11-19 18:52
Severity ?
EPSS score ?
Summary
ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.183Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html", }, { name: "openSUSE-SU-2019:2595", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html", }, { name: "openSUSE-SU-2019:2597", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12625", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-19T17:22:32.861218Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T18:52:35.512Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "ClamAV", vendor: "Cisco", versions: [ { lessThan: "0.101.3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400 Uncontrolled Resource Consumption", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-12-01T06:06:11", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html", }, { name: "openSUSE-SU-2019:2595", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html", }, { name: "openSUSE-SU-2019:2597", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html", }, ], source: { advisory: "clamav-01014", discovery: "USER", }, title: "ClamAV Zip Bomb Vulnerability", x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2019-12625", STATE: "PUBLIC", TITLE: "ClamAV Zip Bomb Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "ClamAV", version: { version_data: [ { version_affected: "<", version_value: "0.101.3", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-400 Uncontrolled Resource Consumption", }, ], }, ], }, references: { reference_data: [ { name: "https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html", refsource: "MISC", url: "https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html", }, { name: "openSUSE-SU-2019:2595", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html", }, { name: "openSUSE-SU-2019:2597", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html", }, ], }, source: { advisory: "clamav-01014", discovery: "USER", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12625", datePublished: "2019-11-05T18:15:36", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-19T18:52:35.512Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0.101.3\", \"matchCriteriaId\": \"94499663-814A-44DD-96D9-3B54212D8281\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.\"}, {\"lang\": \"es\", \"value\": \"Las versiones anteriores a la versi\\u00f3n 0.101.3 de ClamAV son susceptibles a una vulnerabilidad de bomba zip donde un atacante no autenticado puede causar una condici\\u00f3n de denegaci\\u00f3n de servicio mediante el env\\u00edo de mensajes especialmente dise\\u00f1ados en un sistema afectado.\"}]", id: "CVE-2019-12625", lastModified: "2024-11-21T04:23:12.933", metrics: "{\"cvssMetricV31\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2019-11-05T19:15:10.477", references: "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}]", sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-400\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-404\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2019-12625\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2019-11-05T19:15:10.477\",\"lastModified\":\"2024-11-21T04:23:12.933\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.\"},{\"lang\":\"es\",\"value\":\"Las versiones anteriores a la versión 0.101.3 de ClamAV son susceptibles a una vulnerabilidad de bomba zip donde un atacante no autenticado puede causar una condición de denegación de servicio mediante el envío de mensajes especialmente diseñados en un sistema afectado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-404\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.101.3\",\"matchCriteriaId\":\"94499663-814A-44DD-96D9-3B54212D8281\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html\", \"name\": \"openSUSE-SU-2019:2595\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html\", \"name\": \"openSUSE-SU-2019:2597\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T23:24:39.183Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2019-12625\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-19T17:22:32.861218Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-19T17:23:02.698Z\"}}], \"cna\": {\"title\": \"ClamAV Zip Bomb Vulnerability\", \"source\": {\"advisory\": \"clamav-01014\", \"discovery\": \"USER\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"ClamAV\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"0.101.3\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html\", \"name\": \"openSUSE-SU-2019:2595\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html\", \"name\": \"openSUSE-SU-2019:2597\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2019-12-01T06:06:11\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, \"source\": {\"advisory\": \"clamav-01014\", \"discovery\": \"USER\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"0.101.3\", \"version_affected\": \"<\"}]}, \"product_name\": \"ClamAV\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"data_type\": \"CVE\", \"generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"references\": {\"reference_data\": [{\"url\": \"https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html\", \"name\": \"https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html\", \"name\": \"openSUSE-SU-2019:2595\", \"refsource\": \"SUSE\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html\", \"name\": \"openSUSE-SU-2019:2597\", \"refsource\": \"SUSE\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-400 Uncontrolled Resource Consumption\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2019-12625\", \"STATE\": \"PUBLIC\", \"TITLE\": \"ClamAV Zip Bomb Vulnerability\", \"ASSIGNER\": \"psirt@cisco.com\"}}}}", cveMetadata: "{\"cveId\": \"CVE-2019-12625\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-19T18:52:35.512Z\", \"dateReserved\": \"2019-06-04T00:00:00\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2019-11-05T18:15:36\", \"assignerShortName\": \"cisco\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
suse-su-2020:3729-1
Vulnerability from csaf_suse
Published
2020-12-09 13:44
Modified
2020-12-09 13:44
Summary
Security update for clamav
Notes
Title of the patch
Security update for clamav
Description of the patch
This update for clamav fixes the following issues:
clamav was updated to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459.
* clamd can now reload the signature database without blocking
scanning. This multi-threaded database reload improvement was made
possible thanks to a community effort.
- Non-blocking database reloads are now the default behavior. Some
systems that are more constrained on RAM may need to disable
non-blocking reloads as it will temporarily consume two times as
much memory. We added a new clamd config option
ConcurrentDatabaseReload, which may be set to no.
* Fix clamav-milter.service (requires clamd.service to run)
* Fix freshclam crash in FIPS mode. (bsc#1119353)
Update to version 0.102.4:
Accumulated security fixes:
* CVE-2020-3350: Fix a vulnerability wherein a malicious user could
replace a scan target's directory with a symlink to another path
to trick clamscan, clamdscan, or clamonacc into removing or moving
a different file (eg. a critical system file). The issue would
affect users that use the --move or --remove options for clamscan,
clamdscan, and clamonacc. (bsc#1174255)
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
module in ClamAV 0.102.3 that could cause a Denial-of-Service
(DoS) condition. Improper bounds checking results in an
out-of-bounds read which could cause a crash. The previous fix for
this CVE in 0.102.3 was incomplete. This fix correctly resolves
the issue.
* CVE-2020-3481: Fix a vulnerability in the EGG archive module in
ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
condition. Improper error handling may result in a crash due to a
NULL pointer dereference. This vulnerability is mitigated for
those using the official ClamAV signature databases because the
file type signatures in daily.cvd will not enable the EGG archive
parser in versions affected by the vulnerability. (bsc#1174250)
* CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
condition. Improper size checking of a buffer used to initialize AES
decryption routines results in an out-of-bounds read which may cause
a crash. (bsc#1171981)
* CVE-2020-3123: A denial-of-service (DoS) condition may occur when
using the optional credit card data-loss-prevention (DLP) feature.
Improper bounds checking of an unsigned variable resulted in an
out-of-bounds read, which causes a crash.
* CVE-2019-15961: A Denial-of-Service (DoS) vulnerability may
occur when scanning a specially crafted email file as a result
of excessively long scan times. The issue is resolved by
implementing several maximums in parsing MIME messages and by
optimizing use of memory allocation. (bsc#1157763).
* CVE-2019-12900: An out of bounds write in the NSIS bzip2
(bsc#1149458)
* CVE-2019-12625: Introduce a configurable time limit to mitigate
zip bomb vulnerability completely. Default is 2 minutes,
configurable useing the clamscan --max-scantime and for clamd
using the MaxScanTime config option (bsc#1144504)
- Increase the startup timeout of clamd to 5 minutes
to cater for the grown virus database as a workaround until
clamd has learned to talk to systemd to extend the timeout as
long as needed. (bsc#1151839)
Patchnames
SUSE-2020-3729,SUSE-SLE-SERVER-12-SP5-2020-3729
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\nclamav was updated to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459.\n\n* clamd can now reload the signature database without blocking\n scanning. This multi-threaded database reload improvement was made\n possible thanks to a community effort.\n - Non-blocking database reloads are now the default behavior. Some\n systems that are more constrained on RAM may need to disable\n non-blocking reloads as it will temporarily consume two times as\n much memory. We added a new clamd config option\n ConcurrentDatabaseReload, which may be set to no.\n* Fix clamav-milter.service (requires clamd.service to run)\n* Fix freshclam crash in FIPS mode. (bsc#1119353)\n\nUpdate to version 0.102.4:\n\nAccumulated security fixes:\n\n* CVE-2020-3350: Fix a vulnerability wherein a malicious user could\n replace a scan target's directory with a symlink to another path\n to trick clamscan, clamdscan, or clamonacc into removing or moving\n a different file (eg. a critical system file). The issue would\n affect users that use the --move or --remove options for clamscan,\n clamdscan, and clamonacc. (bsc#1174255)\n* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing\n module in ClamAV 0.102.3 that could cause a Denial-of-Service\n (DoS) condition. Improper bounds checking results in an\n out-of-bounds read which could cause a crash. The previous fix for\n this CVE in 0.102.3 was incomplete. This fix correctly resolves\n the issue.\n* CVE-2020-3481: Fix a vulnerability in the EGG archive module in\n ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)\n condition. Improper error handling may result in a crash due to a\n NULL pointer dereference. This vulnerability is mitigated for\n those using the official ClamAV signature databases because the\n file type signatures in daily.cvd will not enable the EGG archive\n parser in versions affected by the vulnerability. (bsc#1174250)\n* CVE-2020-3341: Fix a vulnerability in the PDF parsing module in\n ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)\n condition. Improper size checking of a buffer used to initialize AES\n decryption routines results in an out-of-bounds read which may cause\n a crash. (bsc#1171981)\n* CVE-2020-3123: A denial-of-service (DoS) condition may occur when\n using the optional credit card data-loss-prevention (DLP) feature.\n Improper bounds checking of an unsigned variable resulted in an\n out-of-bounds read, which causes a crash.\n* CVE-2019-15961: A Denial-of-Service (DoS) vulnerability may\n occur when scanning a specially crafted email file as a result\n of excessively long scan times. The issue is resolved by\n implementing several maximums in parsing MIME messages and by\n optimizing use of memory allocation. (bsc#1157763).\n* CVE-2019-12900: An out of bounds write in the NSIS bzip2\n (bsc#1149458)\n* CVE-2019-12625: Introduce a configurable time limit to mitigate\n zip bomb vulnerability completely. Default is 2 minutes,\n configurable useing the clamscan --max-scantime and for clamd\n using the MaxScanTime config option (bsc#1144504)\n\n- Increase the startup timeout of clamd to 5 minutes\n to cater for the grown virus database as a workaround until\n clamd has learned to talk to systemd to extend the timeout as\n long as needed. (bsc#1151839)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2020-3729,SUSE-SLE-SERVER-12-SP5-2020-3729", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3729-1.json", }, { category: "self", summary: "URL for SUSE-SU-2020:3729-1", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20203729-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2020:3729-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html", }, { category: "self", summary: "SUSE Bug 1118459", url: "https://bugzilla.suse.com/1118459", }, { category: "self", summary: "SUSE Bug 1119353", url: "https://bugzilla.suse.com/1119353", }, { category: "self", summary: "SUSE Bug 1144504", url: "https://bugzilla.suse.com/1144504", }, { category: "self", summary: "SUSE Bug 1149458", url: "https://bugzilla.suse.com/1149458", }, { category: "self", summary: "SUSE Bug 1151839", url: "https://bugzilla.suse.com/1151839", }, { category: "self", summary: "SUSE Bug 1157763", url: "https://bugzilla.suse.com/1157763", }, { category: "self", summary: "SUSE Bug 1171981", url: "https://bugzilla.suse.com/1171981", }, { category: "self", summary: "SUSE Bug 1174250", url: "https://bugzilla.suse.com/1174250", }, { category: "self", summary: "SUSE Bug 1174255", url: "https://bugzilla.suse.com/1174255", }, { category: "self", summary: "SUSE CVE CVE-2019-12625 page", url: "https://www.suse.com/security/cve/CVE-2019-12625/", }, { category: "self", summary: "SUSE CVE CVE-2019-12900 page", url: "https://www.suse.com/security/cve/CVE-2019-12900/", }, { category: "self", summary: "SUSE CVE CVE-2019-15961 page", url: "https://www.suse.com/security/cve/CVE-2019-15961/", }, { category: "self", summary: "SUSE CVE CVE-2020-3123 page", url: "https://www.suse.com/security/cve/CVE-2020-3123/", }, { category: "self", summary: "SUSE CVE CVE-2020-3327 page", url: "https://www.suse.com/security/cve/CVE-2020-3327/", }, { category: "self", summary: "SUSE CVE CVE-2020-3341 page", url: "https://www.suse.com/security/cve/CVE-2020-3341/", }, { category: "self", summary: "SUSE CVE CVE-2020-3350 page", url: "https://www.suse.com/security/cve/CVE-2020-3350/", }, { category: "self", summary: "SUSE CVE CVE-2020-3481 page", url: "https://www.suse.com/security/cve/CVE-2020-3481/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2020-12-09T13:44:57Z", generator: { date: "2020-12-09T13:44:57Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2020:3729-1", initial_release_date: "2020-12-09T13:44:57Z", revision_history: [ { date: "2020-12-09T13:44:57Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.103.0-3.3.1.aarch64", product: { name: "clamav-0.103.0-3.3.1.aarch64", product_id: "clamav-0.103.0-3.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "clamav-0.103.0-3.3.1.i586", product: { name: "clamav-0.103.0-3.3.1.i586", product_id: "clamav-0.103.0-3.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "clamav-0.103.0-3.3.1.ppc64le", product: { name: "clamav-0.103.0-3.3.1.ppc64le", product_id: "clamav-0.103.0-3.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "clamav-0.103.0-3.3.1.s390", product: { name: "clamav-0.103.0-3.3.1.s390", product_id: "clamav-0.103.0-3.3.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "clamav-0.103.0-3.3.1.s390x", product: { name: "clamav-0.103.0-3.3.1.s390x", product_id: "clamav-0.103.0-3.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "clamav-0.103.0-3.3.1.x86_64", product: { name: "clamav-0.103.0-3.3.1.x86_64", product_id: "clamav-0.103.0-3.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", }, product_reference: "clamav-0.103.0-3.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", }, product_reference: "clamav-0.103.0-3.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", }, product_reference: "clamav-0.103.0-3.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", }, product_reference: "clamav-0.103.0-3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", }, product_reference: "clamav-0.103.0-3.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", }, product_reference: "clamav-0.103.0-3.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", }, product_reference: "clamav-0.103.0-3.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", }, product_reference: "clamav-0.103.0-3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2019-12625", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12625", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12625", url: "https://www.suse.com/security/cve/CVE-2019-12625", }, { category: "external", summary: "SUSE Bug 1144504 for CVE-2019-12625", url: "https://bugzilla.suse.com/1144504", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-09T13:44:57Z", details: "important", }, ], title: "CVE-2019-12625", }, { cve: "CVE-2019-12900", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12900", }, ], notes: [ { category: "general", text: "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12900", url: "https://www.suse.com/security/cve/CVE-2019-12900", }, { category: "external", summary: "SUSE Bug 1139083 for CVE-2019-12900", url: "https://bugzilla.suse.com/1139083", }, { category: "external", summary: "SUSE Bug 1141513 for CVE-2019-12900", url: "https://bugzilla.suse.com/1141513", }, { category: "external", summary: "SUSE Bug 1149458 for CVE-2019-12900", url: "https://bugzilla.suse.com/1149458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-09T13:44:57Z", details: "important", }, ], title: "CVE-2019-12900", }, { cve: "CVE-2019-15961", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15961", }, ], notes: [ { category: "general", text: "A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15961", url: "https://www.suse.com/security/cve/CVE-2019-15961", }, { category: "external", summary: "SUSE Bug 1157763 for CVE-2019-15961", url: "https://bugzilla.suse.com/1157763", }, { category: "external", summary: "SUSE Bug 1180082 for CVE-2019-15961", url: "https://bugzilla.suse.com/1180082", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-09T13:44:57Z", details: "important", }, ], title: "CVE-2019-15961", }, { cve: "CVE-2020-3123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3123", }, ], notes: [ { category: "general", text: "A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3123", url: "https://www.suse.com/security/cve/CVE-2020-3123", }, { category: "external", summary: "SUSE Bug 1162921 for CVE-2020-3123", url: "https://bugzilla.suse.com/1162921", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-09T13:44:57Z", details: "important", }, ], title: "CVE-2020-3123", }, { cve: "CVE-2020-3327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3327", }, ], notes: [ { category: "general", text: "A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3327", url: "https://www.suse.com/security/cve/CVE-2020-3327", }, { category: "external", summary: "SUSE Bug 1171980 for CVE-2020-3327", url: "https://bugzilla.suse.com/1171980", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3327", url: "https://bugzilla.suse.com/1174250", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-09T13:44:57Z", details: "important", }, ], title: "CVE-2020-3327", }, { cve: "CVE-2020-3341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3341", }, ], notes: [ { category: "general", text: "A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3341", url: "https://www.suse.com/security/cve/CVE-2020-3341", }, { category: "external", summary: "SUSE Bug 1171981 for CVE-2020-3341", url: "https://bugzilla.suse.com/1171981", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-09T13:44:57Z", details: "important", }, ], title: "CVE-2020-3341", }, { cve: "CVE-2020-3350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3350", }, ], notes: [ { category: "general", text: "A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the attacker to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3350", url: "https://www.suse.com/security/cve/CVE-2020-3350", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3350", url: "https://bugzilla.suse.com/1174250", }, { category: "external", summary: "SUSE Bug 1174255 for CVE-2020-3350", url: "https://bugzilla.suse.com/1174255", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-09T13:44:57Z", details: "moderate", }, ], title: "CVE-2020-3350", }, { cve: "CVE-2020-3481", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3481", }, ], notes: [ { category: "general", text: "A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3481", url: "https://www.suse.com/security/cve/CVE-2020-3481", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3481", url: "https://bugzilla.suse.com/1174250", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.0-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.0-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-09T13:44:57Z", details: "important", }, ], title: "CVE-2020-3481", }, ], }
suse-su-2020:3790-1
Vulnerability from csaf_suse
Published
2020-12-14 14:01
Modified
2020-12-14 14:01
Summary
Security update for clamav
Notes
Title of the patch
Security update for clamav
Description of the patch
This update for clamav fixes the following issues:
clamav was updated to the new major release 0.103.0. (jsc#ECO-3010,bsc#1118459)
Note that libclamav was changed incompatible, if you have a 3rd party
application that uses libclamav, it needs to be rebuilt.
Update to 0.103.0
* clamd can now reload the signature database without blocking
scanning. This multi-threaded database reload improvement was made
possible thanks to a community effort.
- Non-blocking database reloads are now the default behavior. Some
systems that are more constrained on RAM may need to disable
non-blocking reloads as it will temporarily consume two times as
much memory. We added a new clamd config option
ConcurrentDatabaseReload, which may be set to no.
* Fix clamav-milter.service (requires clamd.service to run)
Update to 0.102.4
* CVE-2020-3350: Fix a vulnerability wherein a malicious user could
replace a scan target's directory with a symlink to another path
to trick clamscan, clamdscan, or clamonacc into removing or moving
a different file (eg. a critical system file). The issue would
affect users that use the --move or --remove options for clamscan,
clamdscan, and clamonacc.
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
module in ClamAV 0.102.3 that could cause a Denial-of-Service
(DoS) condition. Improper bounds checking results in an
out-of-bounds read which could cause a crash. The previous fix for
this CVE in 0.102.3 was incomplete. This fix correctly resolves
the issue.
* CVE-2020-3481: Fix a vulnerability in the EGG archive module in
ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
condition. Improper error handling may result in a crash due to a
NULL pointer dereference. This vulnerability is mitigated for
those using the official ClamAV signature databases because the
file type signatures in daily.cvd will not enable the EGG archive
parser in versions affected by the vulnerability.
Update to 0.102.3
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
module in ClamAV 0.102.2 that could cause a Denial-of-Service (DoS)
condition. Improper bounds checking of an unsigned variable results
in an out-of-bounds read which causes a crash.
* CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
condition. Improper size checking of a buffer used to initialize AES
decryption routines results in an out-of-bounds read which may cause
a crash.
* Fix 'Attempt to allocate 0 bytes' error when parsing some PDF
documents.
* Fix a couple of minor memory leaks.
* Updated libclamunrar to UnRAR 5.9.2.
Update to 0.102.2:
* CVE-2020-3123: A denial-of-service (DoS) condition may occur when
using the optional credit card data-loss-prevention (DLP) feature.
Improper bounds checking of an unsigned variable resulted in an
out-of-bounds read, which causes a crash.
* Significantly improved the scan speed of PDF files on Windows.
* Re-applied a fix to alleviate file access issues when scanning RAR
files in downstream projects that use libclamav where the scanning
engine is operating in a low-privilege process. This bug was originally
fixed in 0.101.2 and the fix was mistakenly omitted from 0.102.0.
* Fixed an issue where freshclam failed to update if the database version
downloaded is one version older than advertised. This situation may
occur after a new database version is published. The issue affected
users downloading the whole CVD database file.
* Changed the default freshclam ReceiveTimeout setting to 0 (infinite).
The ReceiveTimeout had caused needless database update failures for
users with slower internet connections.
* Correctly display the number of kilobytes (KiB) in progress bar and
reduced the size of the progress bar to accommodate 80-character width
terminals.
* Fixed an issue where running freshclam manually causes a daemonized
freshclam process to fail when it updates because the manual instance
deletes the temporary download directory. The freshclam temporary files
will now download to a unique directory created at the time of an update
instead of using a hardcoded directory created/destroyed at the program
start/exit.
* Fix for freshclam's OnOutdatedExecute config option.
* Fixes a memory leak in the error condition handling for the email
parser.
* Improved bound checking and error handling in ARJ archive parser.
* Improved error handling in PDF parser.
* Fix for memory leak in byte-compare signature handler.
- The freshclam.service should not be started before the network is
online (it checks for updates immediately upon service start)
Update to 0.102.1:
* CVE-2019-15961, bsc#1157763: A Denial-of-Service (DoS)
vulnerability may occur when scanning a specially crafted email
file as a result of excessively long scan times. The issue is
resolved by implementing several maximums in parsing MIME
messages and by optimizing use of memory allocation.
* Build system fixes to build clamav-milter, to correctly link
with libxml2 when detected, and to correctly detect fanotify
for on-access scanning feature support.
* Signature load time is significantly reduced by changing to a
more efficient algorithm for loading signature patterns and
allocating the AC trie. Patch courtesy of Alberto Wu.
* Introduced a new configure option to statically link libjson-c
with libclamav. Static linking with libjson is highly
recommended to prevent crashes in applications that use
libclamav alongside another JSON parsing library.
* Null-dereference fix in email parser when using the
--gen-json metadata option.
* Fixes for Authenticode parsing and certificate signature
(.crb database) bugs.
Update to 0.102.0:
* The On-Access Scanning feature has been migrated out of clamd
and into a brand new utility named clamonacc. This utility is
similar to clamdscan and clamav-milter in that it acts as a
client to clamd. This separation from clamd means that clamd no
longer needs to run with root privileges while scanning potentially
malicious files. Instead, clamd may drop privileges to run under an
account that does not have super-user. In addition to improving the
security posture of running clamd with On-Access enabled, this
update fixed a few outstanding defects:
- On-Access scanning for created and moved files (Extra-Scanning)
is fixed.
- VirusEvent for On-Access scans is fixed.
- With clamonacc, it is now possible to copy, move, or remove a
file if the scan triggered an alert, just like with clamdscan.
* The freshclam database update utility has undergone a significant
update. This includes:
- Added support for HTTPS.
- Support for database mirrors hosted on ports other than 80.
- Removal of the mirror management feature (mirrors.dat).
- An all new libfreshclam library API.
- created new subpackage libfreshclam2
Update to 0.101.4:
* CVE-2019-12900: An out of bounds write in the NSIS bzip2
(bsc#1149458)
* CVE-2019-12625: Introduce a configurable time limit to mitigate
zip bomb vulnerability completely. Default is 2 minutes,
configurable useing the clamscan --max-scantime and for clamd
using the MaxScanTime config option (bsc#1144504)
Update to version 0.101.3:
* bsc#1144504: ZIP bomb causes extreme CPU spikes
Update to version 0.101.2 (bsc#1130721)
* CVE-2019-1787:
An out-of-bounds heap read condition may occur when scanning PDF
documents. The defect is a failure to correctly keep track of the number
of bytes remaining in a buffer when indexing file data.
* CVE-2019-1789:
An out-of-bounds heap read condition may occur when scanning PE files
(i.e. Windows EXE and DLL files) that have been packed using Aspack as a
result of inadequate bound-checking.
* CVE-2019-1788:
An out-of-bounds heap write condition may occur when scanning OLE2 files
such as Microsoft Office 97-2003 documents. The invalid write happens when
an invalid pointer is mistakenly used to initialize a 32bit integer to
zero. This is likely to crash the application.
* CVE-2019-1786:
An out-of-bounds heap read condition may occur when scanning malformed
PDF documents as a result of improper bounds-checking.
* CVE-2019-1785:
A path-traversal write condition may occur as a result of improper
input validation when scanning RAR archives.
* CVE-2019-1798:
A use-after-free condition may occur as a result of improper error
handling when scanning nested RAR archives.
Patchnames
SUSE-2020-3790,SUSE-SLE-Module-Basesystem-15-SP1-2020-3790,SUSE-SLE-Module-Basesystem-15-SP2-2020-3790
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\nclamav was updated to the new major release 0.103.0. (jsc#ECO-3010,bsc#1118459)\n\nNote that libclamav was changed incompatible, if you have a 3rd party\napplication that uses libclamav, it needs to be rebuilt.\n\nUpdate to 0.103.0\n\n* clamd can now reload the signature database without blocking\n scanning. This multi-threaded database reload improvement was made\n possible thanks to a community effort.\n\n - Non-blocking database reloads are now the default behavior. Some\n systems that are more constrained on RAM may need to disable\n non-blocking reloads as it will temporarily consume two times as\n much memory. We added a new clamd config option\n ConcurrentDatabaseReload, which may be set to no.\n\n * Fix clamav-milter.service (requires clamd.service to run)\n\nUpdate to 0.102.4\n\n * CVE-2020-3350: Fix a vulnerability wherein a malicious user could\n replace a scan target's directory with a symlink to another path\n to trick clamscan, clamdscan, or clamonacc into removing or moving\n a different file (eg. a critical system file). The issue would\n affect users that use the --move or --remove options for clamscan,\n clamdscan, and clamonacc.\n * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing\n module in ClamAV 0.102.3 that could cause a Denial-of-Service\n (DoS) condition. Improper bounds checking results in an\n out-of-bounds read which could cause a crash. The previous fix for\n this CVE in 0.102.3 was incomplete. This fix correctly resolves\n the issue.\n * CVE-2020-3481: Fix a vulnerability in the EGG archive module in\n ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)\n condition. Improper error handling may result in a crash due to a\n NULL pointer dereference. This vulnerability is mitigated for\n those using the official ClamAV signature databases because the\n file type signatures in daily.cvd will not enable the EGG archive\n parser in versions affected by the vulnerability.\n\nUpdate to 0.102.3\n\n * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing\n module in ClamAV 0.102.2 that could cause a Denial-of-Service (DoS)\n condition. Improper bounds checking of an unsigned variable results\n in an out-of-bounds read which causes a crash.\n * CVE-2020-3341: Fix a vulnerability in the PDF parsing module in\n ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)\n condition. Improper size checking of a buffer used to initialize AES\n decryption routines results in an out-of-bounds read which may cause\n a crash.\n * Fix 'Attempt to allocate 0 bytes' error when parsing some PDF\n documents.\n * Fix a couple of minor memory leaks.\n * Updated libclamunrar to UnRAR 5.9.2.\n\nUpdate to 0.102.2:\n\n * CVE-2020-3123: A denial-of-service (DoS) condition may occur when\n using the optional credit card data-loss-prevention (DLP) feature.\n Improper bounds checking of an unsigned variable resulted in an\n out-of-bounds read, which causes a crash.\n * Significantly improved the scan speed of PDF files on Windows.\n * Re-applied a fix to alleviate file access issues when scanning RAR\n files in downstream projects that use libclamav where the scanning\n engine is operating in a low-privilege process. This bug was originally\n fixed in 0.101.2 and the fix was mistakenly omitted from 0.102.0.\n * Fixed an issue where freshclam failed to update if the database version\n downloaded is one version older than advertised. This situation may\n occur after a new database version is published. The issue affected\n users downloading the whole CVD database file.\n * Changed the default freshclam ReceiveTimeout setting to 0 (infinite).\n The ReceiveTimeout had caused needless database update failures for\n users with slower internet connections.\n * Correctly display the number of kilobytes (KiB) in progress bar and\n reduced the size of the progress bar to accommodate 80-character width\n terminals.\n * Fixed an issue where running freshclam manually causes a daemonized\n freshclam process to fail when it updates because the manual instance\n deletes the temporary download directory. The freshclam temporary files\n will now download to a unique directory created at the time of an update\n instead of using a hardcoded directory created/destroyed at the program\n start/exit.\n * Fix for freshclam's OnOutdatedExecute config option.\n * Fixes a memory leak in the error condition handling for the email\n parser.\n * Improved bound checking and error handling in ARJ archive parser.\n * Improved error handling in PDF parser.\n * Fix for memory leak in byte-compare signature handler.\n\n- The freshclam.service should not be started before the network is\n online (it checks for updates immediately upon service start)\n\nUpdate to 0.102.1:\n\n * CVE-2019-15961, bsc#1157763: A Denial-of-Service (DoS)\n vulnerability may occur when scanning a specially crafted email\n file as a result of excessively long scan times. The issue is\n resolved by implementing several maximums in parsing MIME\n messages and by optimizing use of memory allocation.\n * Build system fixes to build clamav-milter, to correctly link\n with libxml2 when detected, and to correctly detect fanotify\n for on-access scanning feature support.\n * Signature load time is significantly reduced by changing to a\n more efficient algorithm for loading signature patterns and\n allocating the AC trie. Patch courtesy of Alberto Wu.\n * Introduced a new configure option to statically link libjson-c\n with libclamav. Static linking with libjson is highly\n recommended to prevent crashes in applications that use\n libclamav alongside another JSON parsing library.\n * Null-dereference fix in email parser when using the\n --gen-json metadata option.\n * Fixes for Authenticode parsing and certificate signature\n (.crb database) bugs.\n\nUpdate to 0.102.0:\n\n * The On-Access Scanning feature has been migrated out of clamd\n and into a brand new utility named clamonacc. This utility is\n similar to clamdscan and clamav-milter in that it acts as a\n client to clamd. This separation from clamd means that clamd no\n longer needs to run with root privileges while scanning potentially\n malicious files. Instead, clamd may drop privileges to run under an\n account that does not have super-user. In addition to improving the\n security posture of running clamd with On-Access enabled, this\n update fixed a few outstanding defects:\n - On-Access scanning for created and moved files (Extra-Scanning)\n is fixed.\n - VirusEvent for On-Access scans is fixed.\n - With clamonacc, it is now possible to copy, move, or remove a\n file if the scan triggered an alert, just like with clamdscan.\n * The freshclam database update utility has undergone a significant\n update. This includes:\n - Added support for HTTPS.\n - Support for database mirrors hosted on ports other than 80.\n - Removal of the mirror management feature (mirrors.dat).\n - An all new libfreshclam library API.\n- created new subpackage libfreshclam2\n\nUpdate to 0.101.4:\n\n * CVE-2019-12900: An out of bounds write in the NSIS bzip2\n (bsc#1149458)\n * CVE-2019-12625: Introduce a configurable time limit to mitigate\n zip bomb vulnerability completely. Default is 2 minutes,\n configurable useing the clamscan --max-scantime and for clamd\n using the MaxScanTime config option (bsc#1144504)\n\nUpdate to version 0.101.3:\n\n * bsc#1144504: ZIP bomb causes extreme CPU spikes\n\nUpdate to version 0.101.2 (bsc#1130721)\n\n * CVE-2019-1787:\n An out-of-bounds heap read condition may occur when scanning PDF\n documents. The defect is a failure to correctly keep track of the number\n of bytes remaining in a buffer when indexing file data.\n * CVE-2019-1789:\n An out-of-bounds heap read condition may occur when scanning PE files\n (i.e. Windows EXE and DLL files) that have been packed using Aspack as a\n result of inadequate bound-checking.\n * CVE-2019-1788:\n An out-of-bounds heap write condition may occur when scanning OLE2 files\n such as Microsoft Office 97-2003 documents. The invalid write happens when\n an invalid pointer is mistakenly used to initialize a 32bit integer to\n zero. This is likely to crash the application.\n * CVE-2019-1786:\n An out-of-bounds heap read condition may occur when scanning malformed\n PDF documents as a result of improper bounds-checking.\n * CVE-2019-1785:\n A path-traversal write condition may occur as a result of improper\n input validation when scanning RAR archives.\n * CVE-2019-1798:\n A use-after-free condition may occur as a result of improper error\n handling when scanning nested RAR archives.\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2020-3790,SUSE-SLE-Module-Basesystem-15-SP1-2020-3790,SUSE-SLE-Module-Basesystem-15-SP2-2020-3790", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3790-1.json", }, { category: "self", summary: "URL for SUSE-SU-2020:3790-1", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20203790-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2020:3790-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html", }, { category: "self", summary: "SUSE Bug 1104457", url: "https://bugzilla.suse.com/1104457", }, { category: "self", summary: "SUSE Bug 1118459", url: "https://bugzilla.suse.com/1118459", }, { category: "self", summary: "SUSE Bug 1130721", url: "https://bugzilla.suse.com/1130721", }, { category: "self", summary: "SUSE Bug 1144504", url: "https://bugzilla.suse.com/1144504", }, { category: "self", summary: "SUSE Bug 1149458", url: "https://bugzilla.suse.com/1149458", }, { category: "self", summary: "SUSE Bug 1157763", url: "https://bugzilla.suse.com/1157763", }, { category: "self", summary: "SUSE CVE CVE-2019-12625 page", url: "https://www.suse.com/security/cve/CVE-2019-12625/", }, { category: "self", summary: "SUSE CVE CVE-2019-12900 page", url: "https://www.suse.com/security/cve/CVE-2019-12900/", }, { category: "self", summary: "SUSE CVE CVE-2019-15961 page", url: "https://www.suse.com/security/cve/CVE-2019-15961/", }, { category: "self", summary: "SUSE CVE CVE-2019-1785 page", url: "https://www.suse.com/security/cve/CVE-2019-1785/", }, { category: "self", summary: "SUSE CVE CVE-2019-1786 page", url: "https://www.suse.com/security/cve/CVE-2019-1786/", }, { category: "self", summary: "SUSE CVE CVE-2019-1787 page", url: "https://www.suse.com/security/cve/CVE-2019-1787/", }, { category: "self", summary: "SUSE CVE CVE-2019-1788 page", url: "https://www.suse.com/security/cve/CVE-2019-1788/", }, { category: "self", summary: "SUSE CVE CVE-2019-1789 page", url: "https://www.suse.com/security/cve/CVE-2019-1789/", }, { category: "self", summary: "SUSE CVE CVE-2019-1798 page", url: "https://www.suse.com/security/cve/CVE-2019-1798/", }, { category: "self", summary: "SUSE CVE CVE-2020-3123 page", url: "https://www.suse.com/security/cve/CVE-2020-3123/", }, { category: "self", summary: "SUSE CVE CVE-2020-3327 page", url: "https://www.suse.com/security/cve/CVE-2020-3327/", }, { category: "self", summary: "SUSE CVE CVE-2020-3341 page", url: "https://www.suse.com/security/cve/CVE-2020-3341/", }, { category: "self", summary: "SUSE CVE CVE-2020-3350 page", url: "https://www.suse.com/security/cve/CVE-2020-3350/", }, { category: "self", summary: "SUSE CVE CVE-2020-3481 page", url: "https://www.suse.com/security/cve/CVE-2020-3481/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2020-12-14T14:01:32Z", generator: { date: "2020-12-14T14:01:32Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2020:3790-1", initial_release_date: "2020-12-14T14:01:32Z", revision_history: [ { date: "2020-12-14T14:01:32Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.103.0-3.23.1.aarch64", product: { name: "clamav-0.103.0-3.23.1.aarch64", product_id: "clamav-0.103.0-3.23.1.aarch64", }, }, { category: "product_version", name: "clamav-devel-0.103.0-3.23.1.aarch64", product: { name: "clamav-devel-0.103.0-3.23.1.aarch64", product_id: "clamav-devel-0.103.0-3.23.1.aarch64", }, }, { category: "product_version", name: "libclamav9-0.103.0-3.23.1.aarch64", product: { name: "libclamav9-0.103.0-3.23.1.aarch64", product_id: "libclamav9-0.103.0-3.23.1.aarch64", }, }, { category: "product_version", name: "libfreshclam2-0.103.0-3.23.1.aarch64", product: { name: "libfreshclam2-0.103.0-3.23.1.aarch64", product_id: "libfreshclam2-0.103.0-3.23.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "clamav-0.103.0-3.23.1.i586", product: { name: "clamav-0.103.0-3.23.1.i586", product_id: "clamav-0.103.0-3.23.1.i586", }, }, { category: "product_version", name: "clamav-devel-0.103.0-3.23.1.i586", product: { name: "clamav-devel-0.103.0-3.23.1.i586", product_id: "clamav-devel-0.103.0-3.23.1.i586", }, }, { category: "product_version", name: "libclamav9-0.103.0-3.23.1.i586", product: { name: "libclamav9-0.103.0-3.23.1.i586", product_id: "libclamav9-0.103.0-3.23.1.i586", }, }, { category: "product_version", name: "libfreshclam2-0.103.0-3.23.1.i586", product: { name: "libfreshclam2-0.103.0-3.23.1.i586", product_id: "libfreshclam2-0.103.0-3.23.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "clamav-0.103.0-3.23.1.ppc64le", product: { name: "clamav-0.103.0-3.23.1.ppc64le", product_id: "clamav-0.103.0-3.23.1.ppc64le", }, }, { category: "product_version", name: "clamav-devel-0.103.0-3.23.1.ppc64le", product: { name: "clamav-devel-0.103.0-3.23.1.ppc64le", product_id: "clamav-devel-0.103.0-3.23.1.ppc64le", }, }, { category: "product_version", name: "libclamav9-0.103.0-3.23.1.ppc64le", product: { name: "libclamav9-0.103.0-3.23.1.ppc64le", product_id: "libclamav9-0.103.0-3.23.1.ppc64le", }, }, { category: "product_version", name: "libfreshclam2-0.103.0-3.23.1.ppc64le", product: { name: "libfreshclam2-0.103.0-3.23.1.ppc64le", product_id: "libfreshclam2-0.103.0-3.23.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "clamav-0.103.0-3.23.1.s390x", product: { name: "clamav-0.103.0-3.23.1.s390x", product_id: "clamav-0.103.0-3.23.1.s390x", }, }, { category: "product_version", name: "clamav-devel-0.103.0-3.23.1.s390x", product: { name: "clamav-devel-0.103.0-3.23.1.s390x", product_id: "clamav-devel-0.103.0-3.23.1.s390x", }, }, { category: "product_version", name: "libclamav9-0.103.0-3.23.1.s390x", product: { name: "libclamav9-0.103.0-3.23.1.s390x", product_id: "libclamav9-0.103.0-3.23.1.s390x", }, }, { category: "product_version", name: "libfreshclam2-0.103.0-3.23.1.s390x", product: { name: "libfreshclam2-0.103.0-3.23.1.s390x", product_id: "libfreshclam2-0.103.0-3.23.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "clamav-0.103.0-3.23.1.x86_64", product: { name: "clamav-0.103.0-3.23.1.x86_64", product_id: "clamav-0.103.0-3.23.1.x86_64", }, }, { category: "product_version", name: "clamav-devel-0.103.0-3.23.1.x86_64", product: { name: "clamav-devel-0.103.0-3.23.1.x86_64", product_id: "clamav-devel-0.103.0-3.23.1.x86_64", }, }, { category: "product_version", name: "libclamav9-0.103.0-3.23.1.x86_64", product: { name: "libclamav9-0.103.0-3.23.1.x86_64", product_id: "libclamav9-0.103.0-3.23.1.x86_64", }, }, { category: "product_version", name: "libfreshclam2-0.103.0-3.23.1.x86_64", product: { name: "libfreshclam2-0.103.0-3.23.1.x86_64", product_id: "libfreshclam2-0.103.0-3.23.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.23.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", }, product_reference: "clamav-0.103.0-3.23.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.23.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", }, product_reference: "clamav-0.103.0-3.23.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.23.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", }, product_reference: "clamav-0.103.0-3.23.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.23.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", }, product_reference: "clamav-0.103.0-3.23.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.0-3.23.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", }, product_reference: "clamav-devel-0.103.0-3.23.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.0-3.23.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", }, product_reference: "clamav-devel-0.103.0-3.23.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.0-3.23.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", }, product_reference: "clamav-devel-0.103.0-3.23.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.0-3.23.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", }, product_reference: "clamav-devel-0.103.0-3.23.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.0-3.23.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", }, product_reference: "libclamav9-0.103.0-3.23.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.0-3.23.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", }, product_reference: "libclamav9-0.103.0-3.23.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.0-3.23.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", }, product_reference: "libclamav9-0.103.0-3.23.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.0-3.23.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", }, product_reference: "libclamav9-0.103.0-3.23.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.0-3.23.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", }, product_reference: "libfreshclam2-0.103.0-3.23.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.0-3.23.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", }, product_reference: "libfreshclam2-0.103.0-3.23.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.0-3.23.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", }, product_reference: "libfreshclam2-0.103.0-3.23.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.0-3.23.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", }, product_reference: "libfreshclam2-0.103.0-3.23.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.23.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", }, product_reference: "clamav-0.103.0-3.23.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.23.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", }, product_reference: "clamav-0.103.0-3.23.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.23.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", }, product_reference: "clamav-0.103.0-3.23.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-3.23.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", }, product_reference: "clamav-0.103.0-3.23.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.0-3.23.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", }, product_reference: "clamav-devel-0.103.0-3.23.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.0-3.23.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", }, product_reference: "clamav-devel-0.103.0-3.23.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.0-3.23.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", }, product_reference: "clamav-devel-0.103.0-3.23.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.0-3.23.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", }, product_reference: "clamav-devel-0.103.0-3.23.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.0-3.23.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", }, product_reference: "libclamav9-0.103.0-3.23.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.0-3.23.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", }, product_reference: "libclamav9-0.103.0-3.23.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.0-3.23.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", }, product_reference: "libclamav9-0.103.0-3.23.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.0-3.23.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", }, product_reference: "libclamav9-0.103.0-3.23.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.0-3.23.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", }, product_reference: "libfreshclam2-0.103.0-3.23.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.0-3.23.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", }, product_reference: "libfreshclam2-0.103.0-3.23.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.0-3.23.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", }, product_reference: "libfreshclam2-0.103.0-3.23.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.0-3.23.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", }, product_reference: "libfreshclam2-0.103.0-3.23.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, ], }, vulnerabilities: [ { cve: "CVE-2019-12625", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12625", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12625", url: "https://www.suse.com/security/cve/CVE-2019-12625", }, { category: "external", summary: "SUSE Bug 1144504 for CVE-2019-12625", url: "https://bugzilla.suse.com/1144504", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-14T14:01:32Z", details: "important", }, ], title: "CVE-2019-12625", }, { cve: "CVE-2019-12900", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12900", }, ], notes: [ { category: "general", text: "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12900", url: "https://www.suse.com/security/cve/CVE-2019-12900", }, { category: "external", summary: "SUSE Bug 1139083 for CVE-2019-12900", url: "https://bugzilla.suse.com/1139083", }, { category: "external", summary: "SUSE Bug 1141513 for CVE-2019-12900", url: "https://bugzilla.suse.com/1141513", }, { category: "external", summary: "SUSE Bug 1149458 for CVE-2019-12900", url: "https://bugzilla.suse.com/1149458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-14T14:01:32Z", details: "important", }, ], title: "CVE-2019-12900", }, { cve: "CVE-2019-15961", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15961", }, ], notes: [ { category: "general", text: "A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15961", url: "https://www.suse.com/security/cve/CVE-2019-15961", }, { category: "external", summary: "SUSE Bug 1157763 for CVE-2019-15961", url: "https://bugzilla.suse.com/1157763", }, { category: "external", summary: "SUSE Bug 1180082 for CVE-2019-15961", url: "https://bugzilla.suse.com/1180082", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-14T14:01:32Z", details: "important", }, ], title: "CVE-2019-15961", }, { cve: "CVE-2019-1785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1785", }, ], notes: [ { category: "general", text: "A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1785", url: "https://www.suse.com/security/cve/CVE-2019-1785", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1785", url: "https://bugzilla.suse.com/1130721", }, { category: "external", summary: "SUSE Bug 1137508 for CVE-2019-1785", url: "https://bugzilla.suse.com/1137508", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-14T14:01:32Z", details: "low", }, ], title: "CVE-2019-1785", }, { cve: "CVE-2019-1786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1786", }, ], notes: [ { category: "general", text: "A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1786", url: "https://www.suse.com/security/cve/CVE-2019-1786", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1786", url: "https://bugzilla.suse.com/1130721", }, { category: "external", summary: "SUSE Bug 1137510 for CVE-2019-1786", url: "https://bugzilla.suse.com/1137510", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-14T14:01:32Z", details: "moderate", }, ], title: "CVE-2019-1786", }, { cve: "CVE-2019-1787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1787", }, ], notes: [ { category: "general", text: "A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1787", url: "https://www.suse.com/security/cve/CVE-2019-1787", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1787", url: "https://bugzilla.suse.com/1130721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-14T14:01:32Z", details: "important", }, ], title: "CVE-2019-1787", }, { cve: "CVE-2019-1788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1788", }, ], notes: [ { category: "general", text: "A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1788", url: "https://www.suse.com/security/cve/CVE-2019-1788", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1788", url: "https://bugzilla.suse.com/1130721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-14T14:01:32Z", details: "important", }, ], title: "CVE-2019-1788", }, { cve: "CVE-2019-1789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1789", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1789", url: "https://www.suse.com/security/cve/CVE-2019-1789", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1789", url: "https://bugzilla.suse.com/1130721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-14T14:01:32Z", details: "important", }, ], title: "CVE-2019-1789", }, { cve: "CVE-2019-1798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1798", }, ], notes: [ { category: "general", text: "A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1798", url: "https://www.suse.com/security/cve/CVE-2019-1798", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1798", url: "https://bugzilla.suse.com/1130721", }, { category: "external", summary: "SUSE Bug 1137513 for CVE-2019-1798", url: "https://bugzilla.suse.com/1137513", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-14T14:01:32Z", details: "important", }, ], title: "CVE-2019-1798", }, { cve: "CVE-2020-3123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3123", }, ], notes: [ { category: "general", text: "A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3123", url: "https://www.suse.com/security/cve/CVE-2020-3123", }, { category: "external", summary: "SUSE Bug 1162921 for CVE-2020-3123", url: "https://bugzilla.suse.com/1162921", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-14T14:01:32Z", details: "important", }, ], title: "CVE-2020-3123", }, { cve: "CVE-2020-3327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3327", }, ], notes: [ { category: "general", text: "A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3327", url: "https://www.suse.com/security/cve/CVE-2020-3327", }, { category: "external", summary: "SUSE Bug 1171980 for CVE-2020-3327", url: "https://bugzilla.suse.com/1171980", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3327", url: "https://bugzilla.suse.com/1174250", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-14T14:01:32Z", details: "important", }, ], title: "CVE-2020-3327", }, { cve: "CVE-2020-3341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3341", }, ], notes: [ { category: "general", text: "A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3341", url: "https://www.suse.com/security/cve/CVE-2020-3341", }, { category: "external", summary: "SUSE Bug 1171981 for CVE-2020-3341", url: "https://bugzilla.suse.com/1171981", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-14T14:01:32Z", details: "important", }, ], title: "CVE-2020-3341", }, { cve: "CVE-2020-3350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3350", }, ], notes: [ { category: "general", text: "A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the attacker to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3350", url: "https://www.suse.com/security/cve/CVE-2020-3350", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3350", url: "https://bugzilla.suse.com/1174250", }, { category: "external", summary: "SUSE Bug 1174255 for CVE-2020-3350", url: "https://bugzilla.suse.com/1174255", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-14T14:01:32Z", details: "moderate", }, ], title: "CVE-2020-3350", }, { cve: "CVE-2020-3481", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3481", }, ], notes: [ { category: "general", text: "A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3481", url: "https://www.suse.com/security/cve/CVE-2020-3481", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3481", url: "https://bugzilla.suse.com/1174250", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libfreshclam2-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:clamav-devel-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libclamav9-0.103.0-3.23.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libfreshclam2-0.103.0-3.23.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-14T14:01:32Z", details: "important", }, ], title: "CVE-2020-3481", }, ], }
suse-su-2019:3066-1
Vulnerability from csaf_suse
Published
2019-11-26 08:50
Modified
2019-11-26 08:50
Summary
Security update for clamav
Notes
Title of the patch
Security update for clamav
Description of the patch
This update for clamav fixes the following issues:
Security issue fixed:
- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).
Non-security issues fixed:
- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).
- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).
Patchnames
HPE-Helion-OpenStack-8-2019-3066,SUSE-2019-3066,SUSE-OpenStack-Cloud-7-2019-3066,SUSE-OpenStack-Cloud-8-2019-3066,SUSE-OpenStack-Cloud-Crowbar-8-2019-3066,SUSE-SLE-DESKTOP-12-SP4-2019-3066,SUSE-SLE-SAP-12-SP1-2019-3066,SUSE-SLE-SAP-12-SP2-2019-3066,SUSE-SLE-SAP-12-SP3-2019-3066,SUSE-SLE-SERVER-12-SP1-2019-3066,SUSE-SLE-SERVER-12-SP2-2019-3066,SUSE-SLE-SERVER-12-SP2-BCL-2019-3066,SUSE-SLE-SERVER-12-SP3-2019-3066,SUSE-SLE-SERVER-12-SP3-BCL-2019-3066,SUSE-SLE-SERVER-12-SP4-2019-3066,SUSE-Storage-5-2019-3066
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).\n- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).\n\nNon-security issues fixed:\n\n- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).\n- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).\n", title: "Description of the patch", }, { category: "details", text: "HPE-Helion-OpenStack-8-2019-3066,SUSE-2019-3066,SUSE-OpenStack-Cloud-7-2019-3066,SUSE-OpenStack-Cloud-8-2019-3066,SUSE-OpenStack-Cloud-Crowbar-8-2019-3066,SUSE-SLE-DESKTOP-12-SP4-2019-3066,SUSE-SLE-SAP-12-SP1-2019-3066,SUSE-SLE-SAP-12-SP2-2019-3066,SUSE-SLE-SAP-12-SP3-2019-3066,SUSE-SLE-SERVER-12-SP1-2019-3066,SUSE-SLE-SERVER-12-SP2-2019-3066,SUSE-SLE-SERVER-12-SP2-BCL-2019-3066,SUSE-SLE-SERVER-12-SP3-2019-3066,SUSE-SLE-SERVER-12-SP3-BCL-2019-3066,SUSE-SLE-SERVER-12-SP4-2019-3066,SUSE-Storage-5-2019-3066", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3066-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3066-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193066-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3066-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html", }, { category: "self", summary: "SUSE Bug 1144504", url: "https://bugzilla.suse.com/1144504", }, { category: "self", summary: "SUSE Bug 1149458", url: "https://bugzilla.suse.com/1149458", }, { category: "self", summary: "SUSE Bug 1151839", url: "https://bugzilla.suse.com/1151839", }, { category: "self", summary: "SUSE CVE CVE-2019-12625 page", url: "https://www.suse.com/security/cve/CVE-2019-12625/", }, { category: "self", summary: "SUSE CVE CVE-2019-12900 page", url: "https://www.suse.com/security/cve/CVE-2019-12900/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2019-11-26T08:50:33Z", generator: { date: "2019-11-26T08:50:33Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3066-1", initial_release_date: "2019-11-26T08:50:33Z", revision_history: [ { date: "2019-11-26T08:50:33Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.100.3-33.26.1.aarch64", product: { name: "clamav-0.100.3-33.26.1.aarch64", product_id: "clamav-0.100.3-33.26.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "clamav-0.100.3-33.26.1.i586", product: { name: "clamav-0.100.3-33.26.1.i586", product_id: "clamav-0.100.3-33.26.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "clamav-0.100.3-33.26.1.ppc64le", product: { name: "clamav-0.100.3-33.26.1.ppc64le", product_id: "clamav-0.100.3-33.26.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "clamav-0.100.3-33.26.1.s390", product: { name: "clamav-0.100.3-33.26.1.s390", product_id: "clamav-0.100.3-33.26.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "clamav-0.100.3-33.26.1.s390x", product: { name: "clamav-0.100.3-33.26.1.s390x", product_id: "clamav-0.100.3-33.26.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "clamav-0.100.3-33.26.1.x86_64", product: { name: "clamav-0.100.3-33.26.1.x86_64", product_id: "clamav-0.100.3-33.26.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "HPE Helion OpenStack 8", product: { name: "HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8", product_identification_helper: { cpe: "cpe:/o:suse:hpe-helion-openstack:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 7", product: { name: "SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:7", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 8", product: { name: "SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 8", product: { name: "SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:8", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP4", product: { name: "SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4", product: { name: "SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 5", product: { name: "SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5", product_identification_helper: { cpe: "cpe:/o:suse:ses:5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:clamav-0.100.3-33.26.1.s390x", }, product_reference: "clamav-0.100.3-33.26.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.3-33.26.1.ppc64le", }, product_reference: "clamav-0.100.3-33.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.3-33.26.1.ppc64le", }, product_reference: "clamav-0.100.3-33.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.ppc64le", }, product_reference: "clamav-0.100.3-33.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.s390x", }, product_reference: "clamav-0.100.3-33.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.ppc64le", }, product_reference: "clamav-0.100.3-33.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.s390x", }, product_reference: "clamav-0.100.3-33.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.aarch64", }, product_reference: "clamav-0.100.3-33.26.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.ppc64le", }, product_reference: "clamav-0.100.3-33.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.s390x", }, product_reference: "clamav-0.100.3-33.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.aarch64", }, product_reference: "clamav-0.100.3-33.26.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.ppc64le", }, product_reference: "clamav-0.100.3-33.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.s390x", }, product_reference: "clamav-0.100.3-33.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.aarch64", }, product_reference: "clamav-0.100.3-33.26.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.ppc64le", }, product_reference: "clamav-0.100.3-33.26.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.s390x", }, product_reference: "clamav-0.100.3-33.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.aarch64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:clamav-0.100.3-33.26.1.aarch64", }, product_reference: "clamav-0.100.3-33.26.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-33.26.1.x86_64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:clamav-0.100.3-33.26.1.x86_64", }, product_reference: "clamav-0.100.3-33.26.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, ], }, vulnerabilities: [ { cve: "CVE-2019-12625", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12625", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:clamav-0.100.3-33.26.1.x86_64", "SUSE Enterprise Storage 5:clamav-0.100.3-33.26.1.aarch64", "SUSE Enterprise Storage 5:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.3-33.26.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud 8:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:clamav-0.100.3-33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12625", url: "https://www.suse.com/security/cve/CVE-2019-12625", }, { category: "external", summary: "SUSE Bug 1144504 for CVE-2019-12625", url: "https://bugzilla.suse.com/1144504", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:clamav-0.100.3-33.26.1.x86_64", "SUSE Enterprise Storage 5:clamav-0.100.3-33.26.1.aarch64", "SUSE Enterprise Storage 5:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.3-33.26.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud 8:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:clamav-0.100.3-33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:clamav-0.100.3-33.26.1.x86_64", "SUSE Enterprise Storage 5:clamav-0.100.3-33.26.1.aarch64", "SUSE Enterprise Storage 5:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.3-33.26.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud 8:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:clamav-0.100.3-33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-26T08:50:33Z", details: "important", }, ], title: "CVE-2019-12625", }, { cve: "CVE-2019-12900", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12900", }, ], notes: [ { category: "general", text: "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:clamav-0.100.3-33.26.1.x86_64", "SUSE Enterprise Storage 5:clamav-0.100.3-33.26.1.aarch64", "SUSE Enterprise Storage 5:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.3-33.26.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud 8:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:clamav-0.100.3-33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12900", url: "https://www.suse.com/security/cve/CVE-2019-12900", }, { category: "external", summary: "SUSE Bug 1139083 for CVE-2019-12900", url: "https://bugzilla.suse.com/1139083", }, { category: "external", summary: "SUSE Bug 1141513 for CVE-2019-12900", url: "https://bugzilla.suse.com/1141513", }, { category: "external", summary: "SUSE Bug 1149458 for CVE-2019-12900", url: "https://bugzilla.suse.com/1149458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:clamav-0.100.3-33.26.1.x86_64", "SUSE Enterprise Storage 5:clamav-0.100.3-33.26.1.aarch64", "SUSE Enterprise Storage 5:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.3-33.26.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud 8:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:clamav-0.100.3-33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:clamav-0.100.3-33.26.1.x86_64", "SUSE Enterprise Storage 5:clamav-0.100.3-33.26.1.aarch64", "SUSE Enterprise Storage 5:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.3-33.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.3-33.26.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud 8:clamav-0.100.3-33.26.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:clamav-0.100.3-33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-26T08:50:33Z", details: "important", }, ], title: "CVE-2019-12900", }, ], }
suse-su-2019:3053-1
Vulnerability from csaf_suse
Published
2019-11-25 16:28
Modified
2019-11-25 16:28
Summary
Security update for clamav
Notes
Title of the patch
Security update for clamav
Description of the patch
This update for clamav fixes the following issues:
Security issue fixed:
- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).
Non-security issues fixed:
- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).
- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).
Patchnames
SUSE-2019-3053,SUSE-SLE-Module-Basesystem-15-2019-3053,SUSE-SLE-Module-Basesystem-15-SP1-2019-3053
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).\n- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).\n\nNon-security issues fixed:\n\n- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).\n- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3053,SUSE-SLE-Module-Basesystem-15-2019-3053,SUSE-SLE-Module-Basesystem-15-SP1-2019-3053", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3053-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3053-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193053-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3053-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006169.html", }, { category: "self", summary: "SUSE Bug 1144504", url: "https://bugzilla.suse.com/1144504", }, { category: "self", summary: "SUSE Bug 1149458", url: "https://bugzilla.suse.com/1149458", }, { category: "self", summary: "SUSE Bug 1151839", url: "https://bugzilla.suse.com/1151839", }, { category: "self", summary: "SUSE CVE CVE-2019-12625 page", url: "https://www.suse.com/security/cve/CVE-2019-12625/", }, { category: "self", summary: "SUSE CVE CVE-2019-12900 page", url: "https://www.suse.com/security/cve/CVE-2019-12900/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2019-11-25T16:28:20Z", generator: { date: "2019-11-25T16:28:20Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3053-1", initial_release_date: "2019-11-25T16:28:20Z", revision_history: [ { date: "2019-11-25T16:28:20Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.100.3-3.14.1.aarch64", product: { name: "clamav-0.100.3-3.14.1.aarch64", product_id: "clamav-0.100.3-3.14.1.aarch64", }, }, { category: "product_version", name: "clamav-devel-0.100.3-3.14.1.aarch64", product: { name: "clamav-devel-0.100.3-3.14.1.aarch64", product_id: "clamav-devel-0.100.3-3.14.1.aarch64", }, }, { category: "product_version", name: "libclamav7-0.100.3-3.14.1.aarch64", product: { name: "libclamav7-0.100.3-3.14.1.aarch64", product_id: "libclamav7-0.100.3-3.14.1.aarch64", }, }, { category: "product_version", name: "libclammspack0-0.100.3-3.14.1.aarch64", product: { name: "libclammspack0-0.100.3-3.14.1.aarch64", product_id: "libclammspack0-0.100.3-3.14.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "clamav-0.100.3-3.14.1.i586", product: { name: "clamav-0.100.3-3.14.1.i586", product_id: "clamav-0.100.3-3.14.1.i586", }, }, { category: "product_version", name: "clamav-devel-0.100.3-3.14.1.i586", product: { name: "clamav-devel-0.100.3-3.14.1.i586", product_id: "clamav-devel-0.100.3-3.14.1.i586", }, }, { category: "product_version", name: "libclamav7-0.100.3-3.14.1.i586", product: { name: "libclamav7-0.100.3-3.14.1.i586", product_id: "libclamav7-0.100.3-3.14.1.i586", }, }, { category: "product_version", name: "libclammspack0-0.100.3-3.14.1.i586", product: { name: "libclammspack0-0.100.3-3.14.1.i586", product_id: "libclammspack0-0.100.3-3.14.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "clamav-0.100.3-3.14.1.ppc64le", product: { name: "clamav-0.100.3-3.14.1.ppc64le", product_id: "clamav-0.100.3-3.14.1.ppc64le", }, }, { category: "product_version", name: "clamav-devel-0.100.3-3.14.1.ppc64le", product: { name: "clamav-devel-0.100.3-3.14.1.ppc64le", product_id: "clamav-devel-0.100.3-3.14.1.ppc64le", }, }, { category: "product_version", name: "libclamav7-0.100.3-3.14.1.ppc64le", product: { name: "libclamav7-0.100.3-3.14.1.ppc64le", product_id: "libclamav7-0.100.3-3.14.1.ppc64le", }, }, { category: "product_version", name: "libclammspack0-0.100.3-3.14.1.ppc64le", product: { name: "libclammspack0-0.100.3-3.14.1.ppc64le", product_id: "libclammspack0-0.100.3-3.14.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "clamav-0.100.3-3.14.1.s390x", product: { name: "clamav-0.100.3-3.14.1.s390x", product_id: "clamav-0.100.3-3.14.1.s390x", }, }, { category: "product_version", name: "clamav-devel-0.100.3-3.14.1.s390x", product: { name: "clamav-devel-0.100.3-3.14.1.s390x", product_id: "clamav-devel-0.100.3-3.14.1.s390x", }, }, { category: "product_version", name: "libclamav7-0.100.3-3.14.1.s390x", product: { name: "libclamav7-0.100.3-3.14.1.s390x", product_id: "libclamav7-0.100.3-3.14.1.s390x", }, }, { category: "product_version", name: "libclammspack0-0.100.3-3.14.1.s390x", product: { name: "libclammspack0-0.100.3-3.14.1.s390x", product_id: "libclammspack0-0.100.3-3.14.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "clamav-0.100.3-3.14.1.x86_64", product: { name: "clamav-0.100.3-3.14.1.x86_64", product_id: "clamav-0.100.3-3.14.1.x86_64", }, }, { category: "product_version", name: "clamav-devel-0.100.3-3.14.1.x86_64", product: { name: "clamav-devel-0.100.3-3.14.1.x86_64", product_id: "clamav-devel-0.100.3-3.14.1.x86_64", }, }, { category: "product_version", name: "libclamav7-0.100.3-3.14.1.x86_64", product: { name: "libclamav7-0.100.3-3.14.1.x86_64", product_id: "libclamav7-0.100.3-3.14.1.x86_64", }, }, { category: "product_version", name: "libclammspack0-0.100.3-3.14.1.x86_64", product: { name: "libclammspack0-0.100.3-3.14.1.x86_64", product_id: "libclammspack0-0.100.3-3.14.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15", product: { name: "SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-3.14.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.aarch64", }, product_reference: "clamav-0.100.3-3.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-3.14.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.ppc64le", }, product_reference: "clamav-0.100.3-3.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-3.14.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.s390x", }, product_reference: "clamav-0.100.3-3.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-3.14.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.x86_64", }, product_reference: "clamav-0.100.3-3.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.100.3-3.14.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.aarch64", }, product_reference: "clamav-devel-0.100.3-3.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.100.3-3.14.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.ppc64le", }, product_reference: "clamav-devel-0.100.3-3.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.100.3-3.14.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.s390x", }, product_reference: "clamav-devel-0.100.3-3.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.100.3-3.14.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.x86_64", }, product_reference: "clamav-devel-0.100.3-3.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclamav7-0.100.3-3.14.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.aarch64", }, product_reference: "libclamav7-0.100.3-3.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclamav7-0.100.3-3.14.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.ppc64le", }, product_reference: "libclamav7-0.100.3-3.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclamav7-0.100.3-3.14.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.s390x", }, product_reference: "libclamav7-0.100.3-3.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclamav7-0.100.3-3.14.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.x86_64", }, product_reference: "libclamav7-0.100.3-3.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclammspack0-0.100.3-3.14.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.aarch64", }, product_reference: "libclammspack0-0.100.3-3.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclammspack0-0.100.3-3.14.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.ppc64le", }, product_reference: "libclammspack0-0.100.3-3.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclammspack0-0.100.3-3.14.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.s390x", }, product_reference: "libclammspack0-0.100.3-3.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclammspack0-0.100.3-3.14.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.x86_64", }, product_reference: "libclammspack0-0.100.3-3.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-3.14.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.aarch64", }, product_reference: "clamav-0.100.3-3.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-3.14.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.ppc64le", }, product_reference: "clamav-0.100.3-3.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-3.14.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.s390x", }, product_reference: "clamav-0.100.3-3.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-3.14.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.x86_64", }, product_reference: "clamav-0.100.3-3.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.100.3-3.14.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.aarch64", }, product_reference: "clamav-devel-0.100.3-3.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.100.3-3.14.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.ppc64le", }, product_reference: "clamav-devel-0.100.3-3.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.100.3-3.14.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.s390x", }, product_reference: "clamav-devel-0.100.3-3.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.100.3-3.14.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.x86_64", }, product_reference: "clamav-devel-0.100.3-3.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libclamav7-0.100.3-3.14.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.aarch64", }, product_reference: "libclamav7-0.100.3-3.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libclamav7-0.100.3-3.14.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.ppc64le", }, product_reference: "libclamav7-0.100.3-3.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libclamav7-0.100.3-3.14.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.s390x", }, product_reference: "libclamav7-0.100.3-3.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libclamav7-0.100.3-3.14.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.x86_64", }, product_reference: "libclamav7-0.100.3-3.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libclammspack0-0.100.3-3.14.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.aarch64", }, product_reference: "libclammspack0-0.100.3-3.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libclammspack0-0.100.3-3.14.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.ppc64le", }, product_reference: "libclammspack0-0.100.3-3.14.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libclammspack0-0.100.3-3.14.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.s390x", }, product_reference: "libclammspack0-0.100.3-3.14.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libclammspack0-0.100.3-3.14.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.x86_64", }, product_reference: "libclammspack0-0.100.3-3.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2019-12625", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12625", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12625", url: "https://www.suse.com/security/cve/CVE-2019-12625", }, { category: "external", summary: "SUSE Bug 1144504 for CVE-2019-12625", url: "https://bugzilla.suse.com/1144504", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-25T16:28:20Z", details: "important", }, ], title: "CVE-2019-12625", }, { cve: "CVE-2019-12900", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12900", }, ], notes: [ { category: "general", text: "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12900", url: "https://www.suse.com/security/cve/CVE-2019-12900", }, { category: "external", summary: "SUSE Bug 1139083 for CVE-2019-12900", url: "https://bugzilla.suse.com/1139083", }, { category: "external", summary: "SUSE Bug 1141513 for CVE-2019-12900", url: "https://bugzilla.suse.com/1141513", }, { category: "external", summary: "SUSE Bug 1149458 for CVE-2019-12900", url: "https://bugzilla.suse.com/1149458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:clamav-devel-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclamav7-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libclammspack0-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.3-3.14.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.3-3.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-25T16:28:20Z", details: "important", }, ], title: "CVE-2019-12900", }, ], }
suse-su-2019:14231-1
Vulnerability from csaf_suse
Published
2019-11-26 08:46
Modified
2019-11-26 08:46
Summary
Security update for clamav
Notes
Title of the patch
Security update for clamav
Description of the patch
This update for clamav fixes the following issues:
Security issues fixed:
- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).
Non-security issue fixed:
- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option.
Patchnames
sleposp3-clamav-14231,slessp4-clamav-14231
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).\n- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).\n\nNon-security issue fixed:\n\n- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option.\n", title: "Description of the patch", }, { category: "details", text: "sleposp3-clamav-14231,slessp4-clamav-14231", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_14231-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:14231-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-201914231-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:14231-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006181.html", }, { category: "self", summary: "SUSE Bug 1144504", url: "https://bugzilla.suse.com/1144504", }, { category: "self", summary: "SUSE Bug 1149458", url: "https://bugzilla.suse.com/1149458", }, { category: "self", summary: "SUSE CVE CVE-2019-12625 page", url: "https://www.suse.com/security/cve/CVE-2019-12625/", }, { category: "self", summary: "SUSE CVE CVE-2019-12900 page", url: "https://www.suse.com/security/cve/CVE-2019-12900/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2019-11-26T08:46:39Z", generator: { date: "2019-11-26T08:46:39Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:14231-1", initial_release_date: "2019-11-26T08:46:39Z", revision_history: [ { date: "2019-11-26T08:46:39Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.100.3-0.20.26.1.i586", product: { name: "clamav-0.100.3-0.20.26.1.i586", product_id: "clamav-0.100.3-0.20.26.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "clamav-0.100.3-0.20.26.1.ppc64", product: { name: "clamav-0.100.3-0.20.26.1.ppc64", product_id: "clamav-0.100.3-0.20.26.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "clamav-0.100.3-0.20.26.1.s390x", product: { name: "clamav-0.100.3-0.20.26.1.s390x", product_id: "clamav-0.100.3-0.20.26.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "clamav-0.100.3-0.20.26.1.x86_64", product: { name: "clamav-0.100.3-0.20.26.1.x86_64", product_id: "clamav-0.100.3-0.20.26.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Point of Sale 11 SP3", product: { name: "SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-pos:11:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-0.20.26.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.3-0.20.26.1.i586", }, product_reference: "clamav-0.100.3-0.20.26.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-0.20.26.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.i586", }, product_reference: "clamav-0.100.3-0.20.26.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-0.20.26.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.ppc64", }, product_reference: "clamav-0.100.3-0.20.26.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-0.20.26.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.s390x", }, product_reference: "clamav-0.100.3-0.20.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-0.20.26.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.x86_64", }, product_reference: "clamav-0.100.3-0.20.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2019-12625", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12625", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.3-0.20.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12625", url: "https://www.suse.com/security/cve/CVE-2019-12625", }, { category: "external", summary: "SUSE Bug 1144504 for CVE-2019-12625", url: "https://bugzilla.suse.com/1144504", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.3-0.20.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.3-0.20.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-26T08:46:39Z", details: "important", }, ], title: "CVE-2019-12625", }, { cve: "CVE-2019-12900", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12900", }, ], notes: [ { category: "general", text: "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.3-0.20.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12900", url: "https://www.suse.com/security/cve/CVE-2019-12900", }, { category: "external", summary: "SUSE Bug 1139083 for CVE-2019-12900", url: "https://bugzilla.suse.com/1139083", }, { category: "external", summary: "SUSE Bug 1141513 for CVE-2019-12900", url: "https://bugzilla.suse.com/1141513", }, { category: "external", summary: "SUSE Bug 1149458 for CVE-2019-12900", url: "https://bugzilla.suse.com/1149458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.3-0.20.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.3-0.20.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:clamav-0.100.3-0.20.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-26T08:46:39Z", details: "important", }, ], title: "CVE-2019-12900", }, ], }
fkie_cve-2019-12625
Vulnerability from fkie_nvd
Published
2019-11-05 19:15
Modified
2024-11-21 04:23
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*", matchCriteriaId: "94499663-814A-44DD-96D9-3B54212D8281", versionEndExcluding: "0.101.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", }, { lang: "es", value: "Las versiones anteriores a la versión 0.101.3 de ClamAV son susceptibles a una vulnerabilidad de bomba zip donde un atacante no autenticado puede causar una condición de denegación de servicio mediante el envío de mensajes especialmente diseñados en un sistema afectado.", }, ], id: "CVE-2019-12625", lastModified: "2024-11-21T04:23:12.933", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-05T19:15:10.477", references: [ { source: "psirt@cisco.com", url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html", }, { source: "psirt@cisco.com", url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html", }, { source: "psirt@cisco.com", tags: [ "Mitigation", "Vendor Advisory", ], url: "https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mitigation", "Vendor Advisory", ], url: "https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-404", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
ghsa-fj79-gf26-7c3p
Vulnerability from github
Published
2022-05-24 17:00
Modified
2024-04-04 02:38
Severity ?
Details
ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.
{ affected: [], aliases: [ "CVE-2019-12625", ], database_specific: { cwe_ids: [ "CWE-400", "CWE-404", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2019-11-05T19:15:00Z", severity: "HIGH", }, details: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", id: "GHSA-fj79-gf26-7c3p", modified: "2024-04-04T02:38:21Z", published: "2022-05-24T17:00:21Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-12625", }, { type: "WEB", url: "https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", type: "CVSS_V3", }, ], }
opensuse-su-2024:10685-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
clamav-0.103.3-1.4 on GA media
Notes
Title of the patch
clamav-0.103.3-1.4 on GA media
Description of the patch
These are all security issues fixed in the clamav-0.103.3-1.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10685
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "clamav-0.103.3-1.4 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the clamav-0.103.3-1.4 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10685", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10685-1.json", }, { category: "self", summary: "SUSE CVE CVE-2005-3239 page", url: "https://www.suse.com/security/cve/CVE-2005-3239/", }, { category: "self", summary: "SUSE CVE CVE-2005-3303 page", url: "https://www.suse.com/security/cve/CVE-2005-3303/", }, { category: "self", summary: "SUSE CVE CVE-2006-1614 page", url: "https://www.suse.com/security/cve/CVE-2006-1614/", }, { category: "self", summary: "SUSE CVE CVE-2006-1989 page", url: "https://www.suse.com/security/cve/CVE-2006-1989/", }, { category: "self", summary: "SUSE CVE CVE-2006-4182 page", url: "https://www.suse.com/security/cve/CVE-2006-4182/", }, { category: "self", summary: "SUSE CVE CVE-2006-5874 page", url: "https://www.suse.com/security/cve/CVE-2006-5874/", }, { category: "self", summary: "SUSE CVE CVE-2007-0897 page", url: "https://www.suse.com/security/cve/CVE-2007-0897/", }, { category: "self", summary: "SUSE CVE CVE-2007-0898 page", url: "https://www.suse.com/security/cve/CVE-2007-0898/", }, { category: "self", summary: "SUSE CVE CVE-2007-1745 page", url: "https://www.suse.com/security/cve/CVE-2007-1745/", }, { category: "self", summary: "SUSE CVE CVE-2007-1997 page", url: "https://www.suse.com/security/cve/CVE-2007-1997/", }, { category: "self", summary: "SUSE CVE CVE-2007-6335 page", url: "https://www.suse.com/security/cve/CVE-2007-6335/", }, { category: "self", summary: "SUSE CVE CVE-2007-6336 page", url: "https://www.suse.com/security/cve/CVE-2007-6336/", }, { category: "self", summary: "SUSE CVE CVE-2007-6337 page", url: "https://www.suse.com/security/cve/CVE-2007-6337/", }, { category: "self", summary: "SUSE CVE CVE-2007-6595 page", url: "https://www.suse.com/security/cve/CVE-2007-6595/", }, { category: "self", summary: "SUSE CVE CVE-2007-6596 page", url: "https://www.suse.com/security/cve/CVE-2007-6596/", }, { category: "self", summary: "SUSE CVE CVE-2008-0318 page", url: "https://www.suse.com/security/cve/CVE-2008-0318/", }, { category: "self", summary: "SUSE CVE CVE-2008-0728 page", url: "https://www.suse.com/security/cve/CVE-2008-0728/", }, { category: "self", summary: "SUSE CVE CVE-2008-1100 page", url: "https://www.suse.com/security/cve/CVE-2008-1100/", }, { category: "self", summary: "SUSE CVE CVE-2008-2713 page", url: "https://www.suse.com/security/cve/CVE-2008-2713/", }, { category: "self", summary: "SUSE CVE CVE-2010-1205 page", url: "https://www.suse.com/security/cve/CVE-2010-1205/", }, { category: "self", summary: "SUSE CVE CVE-2012-6706 page", url: "https://www.suse.com/security/cve/CVE-2012-6706/", }, { category: "self", summary: "SUSE CVE CVE-2017-11423 page", url: "https://www.suse.com/security/cve/CVE-2017-11423/", }, { category: "self", summary: "SUSE CVE CVE-2017-12374 page", url: "https://www.suse.com/security/cve/CVE-2017-12374/", }, { category: "self", summary: "SUSE CVE CVE-2017-12375 page", url: "https://www.suse.com/security/cve/CVE-2017-12375/", }, { category: "self", summary: "SUSE CVE CVE-2017-12376 page", url: "https://www.suse.com/security/cve/CVE-2017-12376/", }, { category: "self", summary: "SUSE CVE CVE-2017-12377 page", url: "https://www.suse.com/security/cve/CVE-2017-12377/", }, { category: "self", summary: "SUSE CVE CVE-2017-12378 page", url: "https://www.suse.com/security/cve/CVE-2017-12378/", }, { category: "self", summary: "SUSE CVE CVE-2017-12379 page", url: "https://www.suse.com/security/cve/CVE-2017-12379/", }, { category: "self", summary: "SUSE CVE CVE-2017-12380 page", url: "https://www.suse.com/security/cve/CVE-2017-12380/", }, { category: "self", summary: "SUSE CVE CVE-2017-6418 page", url: "https://www.suse.com/security/cve/CVE-2017-6418/", }, { category: "self", summary: "SUSE CVE CVE-2017-6419 page", url: "https://www.suse.com/security/cve/CVE-2017-6419/", }, { category: "self", summary: "SUSE CVE CVE-2017-6420 page", url: "https://www.suse.com/security/cve/CVE-2017-6420/", }, { category: "self", summary: "SUSE CVE CVE-2018-0202 page", url: "https://www.suse.com/security/cve/CVE-2018-0202/", }, { category: "self", summary: "SUSE CVE CVE-2018-0360 page", url: "https://www.suse.com/security/cve/CVE-2018-0360/", }, { category: "self", summary: "SUSE CVE CVE-2018-0361 page", url: "https://www.suse.com/security/cve/CVE-2018-0361/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000085 page", url: "https://www.suse.com/security/cve/CVE-2018-1000085/", }, { category: "self", summary: "SUSE CVE CVE-2018-14680 page", url: "https://www.suse.com/security/cve/CVE-2018-14680/", }, { category: "self", summary: "SUSE CVE CVE-2018-15378 page", url: "https://www.suse.com/security/cve/CVE-2018-15378/", }, { category: "self", summary: "SUSE CVE CVE-2019-12625 page", url: "https://www.suse.com/security/cve/CVE-2019-12625/", }, { category: "self", summary: "SUSE CVE CVE-2019-12900 page", url: "https://www.suse.com/security/cve/CVE-2019-12900/", }, { category: "self", summary: "SUSE CVE CVE-2019-15961 page", url: "https://www.suse.com/security/cve/CVE-2019-15961/", }, { category: "self", summary: "SUSE CVE CVE-2019-1785 page", url: "https://www.suse.com/security/cve/CVE-2019-1785/", }, { category: "self", summary: "SUSE CVE CVE-2019-1786 page", url: "https://www.suse.com/security/cve/CVE-2019-1786/", }, { category: "self", summary: "SUSE CVE CVE-2019-1787 page", url: "https://www.suse.com/security/cve/CVE-2019-1787/", }, { category: "self", summary: "SUSE CVE CVE-2019-1788 page", url: "https://www.suse.com/security/cve/CVE-2019-1788/", }, { category: "self", summary: "SUSE CVE CVE-2019-1789 page", url: "https://www.suse.com/security/cve/CVE-2019-1789/", }, { category: "self", summary: "SUSE CVE CVE-2019-1798 page", url: "https://www.suse.com/security/cve/CVE-2019-1798/", }, { category: "self", summary: "SUSE CVE CVE-2020-3123 page", url: "https://www.suse.com/security/cve/CVE-2020-3123/", }, { category: "self", summary: "SUSE CVE CVE-2020-3327 page", url: "https://www.suse.com/security/cve/CVE-2020-3327/", }, { category: "self", summary: "SUSE CVE CVE-2020-3341 page", url: "https://www.suse.com/security/cve/CVE-2020-3341/", }, { category: "self", summary: "SUSE CVE CVE-2020-3350 page", url: "https://www.suse.com/security/cve/CVE-2020-3350/", }, { category: "self", summary: "SUSE CVE CVE-2020-3481 page", url: "https://www.suse.com/security/cve/CVE-2020-3481/", }, { category: "self", summary: "SUSE CVE CVE-2021-1252 page", url: "https://www.suse.com/security/cve/CVE-2021-1252/", }, { category: "self", summary: "SUSE CVE CVE-2021-1404 page", url: "https://www.suse.com/security/cve/CVE-2021-1404/", }, { category: "self", summary: "SUSE CVE CVE-2021-1405 page", url: "https://www.suse.com/security/cve/CVE-2021-1405/", }, ], title: "clamav-0.103.3-1.4 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10685-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.103.3-1.4.aarch64", product: { name: "clamav-0.103.3-1.4.aarch64", product_id: "clamav-0.103.3-1.4.aarch64", }, }, { category: "product_version", name: "clamav-devel-0.103.3-1.4.aarch64", product: { name: "clamav-devel-0.103.3-1.4.aarch64", product_id: "clamav-devel-0.103.3-1.4.aarch64", }, }, { category: "product_version", name: "clamav-milter-0.103.3-1.4.aarch64", product: { name: "clamav-milter-0.103.3-1.4.aarch64", product_id: "clamav-milter-0.103.3-1.4.aarch64", }, }, { category: "product_version", name: "libclamav9-0.103.3-1.4.aarch64", product: { name: "libclamav9-0.103.3-1.4.aarch64", product_id: "libclamav9-0.103.3-1.4.aarch64", }, }, { category: "product_version", name: "libfreshclam2-0.103.3-1.4.aarch64", product: { name: "libfreshclam2-0.103.3-1.4.aarch64", product_id: "libfreshclam2-0.103.3-1.4.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "clamav-0.103.3-1.4.ppc64le", product: { name: "clamav-0.103.3-1.4.ppc64le", product_id: "clamav-0.103.3-1.4.ppc64le", }, }, { category: "product_version", name: "clamav-devel-0.103.3-1.4.ppc64le", product: { name: "clamav-devel-0.103.3-1.4.ppc64le", product_id: "clamav-devel-0.103.3-1.4.ppc64le", }, }, { category: "product_version", name: "clamav-milter-0.103.3-1.4.ppc64le", product: { name: "clamav-milter-0.103.3-1.4.ppc64le", product_id: "clamav-milter-0.103.3-1.4.ppc64le", }, }, { category: "product_version", name: "libclamav9-0.103.3-1.4.ppc64le", product: { name: "libclamav9-0.103.3-1.4.ppc64le", product_id: "libclamav9-0.103.3-1.4.ppc64le", }, }, { category: "product_version", name: "libfreshclam2-0.103.3-1.4.ppc64le", product: { name: "libfreshclam2-0.103.3-1.4.ppc64le", product_id: "libfreshclam2-0.103.3-1.4.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "clamav-0.103.3-1.4.s390x", product: { name: "clamav-0.103.3-1.4.s390x", product_id: "clamav-0.103.3-1.4.s390x", }, }, { category: "product_version", name: "clamav-devel-0.103.3-1.4.s390x", product: { name: "clamav-devel-0.103.3-1.4.s390x", product_id: "clamav-devel-0.103.3-1.4.s390x", }, }, { category: "product_version", name: "clamav-milter-0.103.3-1.4.s390x", product: { name: "clamav-milter-0.103.3-1.4.s390x", product_id: "clamav-milter-0.103.3-1.4.s390x", }, }, { category: "product_version", name: "libclamav9-0.103.3-1.4.s390x", product: { name: "libclamav9-0.103.3-1.4.s390x", product_id: "libclamav9-0.103.3-1.4.s390x", }, }, { category: "product_version", name: "libfreshclam2-0.103.3-1.4.s390x", product: { name: "libfreshclam2-0.103.3-1.4.s390x", product_id: "libfreshclam2-0.103.3-1.4.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "clamav-0.103.3-1.4.x86_64", product: { name: "clamav-0.103.3-1.4.x86_64", product_id: "clamav-0.103.3-1.4.x86_64", }, }, { category: "product_version", name: "clamav-devel-0.103.3-1.4.x86_64", product: { name: "clamav-devel-0.103.3-1.4.x86_64", product_id: "clamav-devel-0.103.3-1.4.x86_64", }, }, { category: "product_version", name: "clamav-milter-0.103.3-1.4.x86_64", product: { name: "clamav-milter-0.103.3-1.4.x86_64", product_id: "clamav-milter-0.103.3-1.4.x86_64", }, }, { category: "product_version", name: "libclamav9-0.103.3-1.4.x86_64", product: { name: "libclamav9-0.103.3-1.4.x86_64", product_id: "libclamav9-0.103.3-1.4.x86_64", }, }, { category: "product_version", name: "libfreshclam2-0.103.3-1.4.x86_64", product: { name: "libfreshclam2-0.103.3-1.4.x86_64", product_id: "libfreshclam2-0.103.3-1.4.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.103.3-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", }, product_reference: "clamav-0.103.3-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.3-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", }, product_reference: "clamav-0.103.3-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.3-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", }, product_reference: "clamav-0.103.3-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.3-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", }, product_reference: "clamav-0.103.3-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.3-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", }, product_reference: "clamav-devel-0.103.3-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.3-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", }, product_reference: "clamav-devel-0.103.3-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.3-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", }, product_reference: "clamav-devel-0.103.3-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.3-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", }, product_reference: "clamav-devel-0.103.3-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-milter-0.103.3-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", }, product_reference: "clamav-milter-0.103.3-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-milter-0.103.3-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", }, product_reference: "clamav-milter-0.103.3-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-milter-0.103.3-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", }, product_reference: "clamav-milter-0.103.3-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-milter-0.103.3-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", }, product_reference: "clamav-milter-0.103.3-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.3-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", }, product_reference: "libclamav9-0.103.3-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.3-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", }, product_reference: "libclamav9-0.103.3-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.3-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", }, product_reference: "libclamav9-0.103.3-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.3-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", }, product_reference: "libclamav9-0.103.3-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.3-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", }, product_reference: "libfreshclam2-0.103.3-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.3-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", }, product_reference: "libfreshclam2-0.103.3-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.3-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", }, product_reference: "libfreshclam2-0.103.3-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.3-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", }, product_reference: "libfreshclam2-0.103.3-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2005-3239", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2005-3239", }, ], notes: [ { category: "general", text: "The OLE2 unpacker in clamd in Clam AntiVirus (ClamAV) 0.87-1 allows remote attackers to cause a denial of service (segmentation fault) via a DOC file with an invalid property tree, which triggers an infinite recursion in the ole2_walk_property_tree function.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2005-3239", url: "https://www.suse.com/security/cve/CVE-2005-3239", }, { category: "external", summary: "SUSE Bug 132305 for CVE-2005-3239", url: "https://bugzilla.suse.com/132305", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2005-3239", }, { cve: "CVE-2005-3303", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2005-3303", }, ], notes: [ { category: "general", text: "The FSG unpacker (fsg.c) in Clam AntiVirus (ClamAV) 0.80 through 0.87 allows remote attackers to cause \"memory corruption\" and execute arbitrary code via a crafted FSG 1.33 file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2005-3303", url: "https://www.suse.com/security/cve/CVE-2005-3303", }, { category: "external", summary: "SUSE Bug 132305 for CVE-2005-3303", url: "https://bugzilla.suse.com/132305", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2005-3303", }, { cve: "CVE-2006-1614", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2006-1614", }, ], notes: [ { category: "general", text: "Integer overflow in the cli_scanpe function in the PE header parser (libclamav/pe.c) in Clam AntiVirus (ClamAV) before 0.88.1, when ArchiveMaxFileSize is disabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2006-1614", url: "https://www.suse.com/security/cve/CVE-2006-1614", }, { category: "external", summary: "SUSE Bug 164039 for CVE-2006-1614", url: "https://bugzilla.suse.com/164039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2006-1614", }, { cve: "CVE-2006-1989", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2006-1989", }, ], notes: [ { category: "general", text: "Buffer overflow in the get_database function in the HTTP client in Freshclam in ClamAV 0.80 to 0.88.1 might allow remote web servers to execute arbitrary code via long HTTP headers.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2006-1989", url: "https://www.suse.com/security/cve/CVE-2006-1989", }, { category: "external", summary: "SUSE Bug 171496 for CVE-2006-1989", url: "https://bugzilla.suse.com/171496", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2006-1989", }, { cve: "CVE-2006-4182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2006-4182", }, ], notes: [ { category: "general", text: "Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, allows remote attackers to cause a denial of service (scanning service crash) and execute arbitrary code via a crafted Portable Executable (PE) file that leads to a heap-based buffer overflow when less memory is allocated than expected.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2006-4182", url: "https://www.suse.com/security/cve/CVE-2006-4182", }, { category: "external", summary: "SUSE Bug 212898 for CVE-2006-4182", url: "https://bugzilla.suse.com/212898", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2006-4182", }, { cve: "CVE-2006-5874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2006-5874", }, ], notes: [ { category: "general", text: "Clam AntiVirus (ClamAV) 0.88 and earlier allows remote attackers to cause a denial of service (crash) via a malformed base64-encoded MIME attachment that triggers a null pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2006-5874", url: "https://www.suse.com/security/cve/CVE-2006-5874", }, { category: "external", summary: "SUSE Bug 227827 for CVE-2006-5874", url: "https://bugzilla.suse.com/227827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2006-5874", }, { cve: "CVE-2007-0897", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-0897", }, ], notes: [ { category: "general", text: "Clam AntiVirus ClamAV before 0.90 does not close open file descriptors under certain conditions, which allows remote attackers to cause a denial of service (file descriptor consumption and failed scans) via CAB archives with a cabinet header record length of zero, which causes a function to return without closing a file descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-0897", url: "https://www.suse.com/security/cve/CVE-2007-0897", }, { category: "external", summary: "SUSE Bug 246214 for CVE-2007-0897", url: "https://bugzilla.suse.com/246214", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2007-0897", }, { cve: "CVE-2007-0898", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-0898", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in clamd in Clam AntiVirus ClamAV before 0.90 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the id MIME header parameter in a multi-part message.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-0898", url: "https://www.suse.com/security/cve/CVE-2007-0898", }, { category: "external", summary: "SUSE Bug 246214 for CVE-2007-0898", url: "https://bugzilla.suse.com/246214", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2007-0898", }, { cve: "CVE-2007-1745", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-1745", }, ], notes: [ { category: "general", text: "The chm_decompress_stream function in libclamav/chmunpack.c in Clam AntiVirus (ClamAV) before 0.90.2 leaks file descriptors, which has unknown impact and attack vectors involving a crafted CHM file, a different vulnerability than CVE-2007-0897. NOTE: some of these details are obtained from third party information.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-1745", url: "https://www.suse.com/security/cve/CVE-2007-1745", }, { category: "external", summary: "SUSE Bug 264189 for CVE-2007-1745", url: "https://bugzilla.suse.com/264189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2007-1745", }, { cve: "CVE-2007-1997", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-1997", }, ], notes: [ { category: "general", text: "Integer signedness error in the (1) cab_unstore and (2) cab_extract functions in libclamav/cab.c in Clam AntiVirus (ClamAV) before 0.90.2 allow remote attackers to execute arbitrary code via a crafted CHM file that contains a negative integer, which passes a signed comparison and leads to a stack-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-1997", url: "https://www.suse.com/security/cve/CVE-2007-1997", }, { category: "external", summary: "SUSE Bug 264189 for CVE-2007-1997", url: "https://bugzilla.suse.com/264189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2007-1997", }, { cve: "CVE-2007-6335", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-6335", }, ], notes: [ { category: "general", text: "Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-6335", url: "https://www.suse.com/security/cve/CVE-2007-6335", }, { category: "external", summary: "SUSE Bug 343277 for CVE-2007-6335", url: "https://bugzilla.suse.com/343277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2007-6335", }, { cve: "CVE-2007-6336", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-6336", }, ], notes: [ { category: "general", text: "Off-by-one error in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MS-ZIP compressed CAB file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-6336", url: "https://www.suse.com/security/cve/CVE-2007-6336", }, { category: "external", summary: "SUSE Bug 343277 for CVE-2007-6336", url: "https://bugzilla.suse.com/343277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2007-6336", }, { cve: "CVE-2007-6337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-6337", }, ], notes: [ { category: "general", text: "Unspecified vulnerability in the bzip2 decompression algorithm in nsis/bzlib_private.h in ClamAV before 0.92 has unknown impact and remote attack vectors.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-6337", url: "https://www.suse.com/security/cve/CVE-2007-6337", }, { category: "external", summary: "SUSE Bug 343277 for CVE-2007-6337", url: "https://bugzilla.suse.com/343277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2007-6337", }, { cve: "CVE-2007-6595", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-6595", }, ], notes: [ { category: "general", text: "ClamAV 0.92 allows local users to overwrite arbitrary files via a symlink attack on (1) temporary files used by the cli_gentempfd function in libclamav/others.c or on (2) .ascii files used by sigtool, when utf16-decode is enabled.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-6595", url: "https://www.suse.com/security/cve/CVE-2007-6595", }, { category: "external", summary: "SUSE Bug 350987 for CVE-2007-6595", url: "https://bugzilla.suse.com/350987", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2007-6595", }, { cve: "CVE-2007-6596", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-6596", }, ], notes: [ { category: "general", text: "ClamAV 0.92 does not recognize Base64 UUEncoded archives, which allows remote attackers to bypass the scanner via a Base64-UUEncoded file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-6596", url: "https://www.suse.com/security/cve/CVE-2007-6596", }, { category: "external", summary: "SUSE Bug 350987 for CVE-2007-6596", url: "https://bugzilla.suse.com/350987", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2007-6596", }, { cve: "CVE-2008-0318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-0318", }, ], notes: [ { category: "general", text: "Integer overflow in the cli_scanpe function in libclamav in ClamAV before 0.92.1, as used in clamd, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Petite packed PE file, which triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-0318", url: "https://www.suse.com/security/cve/CVE-2008-0318", }, { category: "external", summary: "SUSE Bug 361374 for CVE-2008-0318", url: "https://bugzilla.suse.com/361374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2008-0318", }, { cve: "CVE-2008-0728", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-0728", }, ], notes: [ { category: "general", text: "The unmew11 function in libclamav/mew.c in libclamav in ClamAV before 0.92.1 has unknown impact and attack vectors that trigger \"heap corruption.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-0728", url: "https://www.suse.com/security/cve/CVE-2008-0728", }, { category: "external", summary: "SUSE Bug 361403 for CVE-2008-0728", url: "https://bugzilla.suse.com/361403", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2008-0728", }, { cve: "CVE-2008-1100", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-1100", }, ], notes: [ { category: "general", text: "Buffer overflow in the cli_scanpe function in libclamav (libclamav/pe.c) for ClamAV 0.92 and 0.92.1 allows remote attackers to execute arbitrary code via a crafted Upack PE file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-1100", url: "https://www.suse.com/security/cve/CVE-2008-1100", }, { category: "external", summary: "SUSE Bug 368963 for CVE-2008-1100", url: "https://bugzilla.suse.com/368963", }, { category: "external", summary: "SUSE Bug 379695 for CVE-2008-1100", url: "https://bugzilla.suse.com/379695", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2008-1100", }, { cve: "CVE-2008-2713", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-2713", }, ], notes: [ { category: "general", text: "libclamav/petite.c in ClamAV before 0.93.1 allows remote attackers to cause a denial of service via a crafted Petite file that triggers an out-of-bounds read.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-2713", url: "https://www.suse.com/security/cve/CVE-2008-2713", }, { category: "external", summary: "SUSE Bug 399302 for CVE-2008-2713", url: "https://bugzilla.suse.com/399302", }, { category: "external", summary: "SUSE Bug 406994 for CVE-2008-2713", url: "https://bugzilla.suse.com/406994", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2008-2713", }, { cve: "CVE-2010-1205", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-1205", }, ], notes: [ { category: "general", text: "Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-1205", url: "https://www.suse.com/security/cve/CVE-2010-1205", }, { category: "external", summary: "SUSE Bug 1188284 for CVE-2010-1205", url: "https://bugzilla.suse.com/1188284", }, { category: "external", summary: "SUSE Bug 617866 for CVE-2010-1205", url: "https://bugzilla.suse.com/617866", }, { category: "external", summary: "SUSE Bug 622506 for CVE-2010-1205", url: "https://bugzilla.suse.com/622506", }, { category: "external", summary: "SUSE Bug 639941 for CVE-2010-1205", url: "https://bugzilla.suse.com/639941", }, { category: "external", summary: "SUSE Bug 854395 for CVE-2010-1205", url: "https://bugzilla.suse.com/854395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2010-1205", }, { cve: "CVE-2012-6706", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-6706", }, ], notes: [ { category: "general", text: "A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the \"DestPos\" variable, which allows the attacker to write out of bounds when setting Mem[DestPos].", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-6706", url: "https://www.suse.com/security/cve/CVE-2012-6706", }, { category: "external", summary: "SUSE Bug 1045315 for CVE-2012-6706", url: "https://bugzilla.suse.com/1045315", }, { category: "external", summary: "SUSE Bug 1045490 for CVE-2012-6706", url: "https://bugzilla.suse.com/1045490", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2012-6706", url: "https://bugzilla.suse.com/1053919", }, { category: "external", summary: "SUSE Bug 1083915 for CVE-2012-6706", url: "https://bugzilla.suse.com/1083915", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2012-6706", }, { cve: "CVE-2017-11423", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-11423", }, ], notes: [ { category: "general", text: "The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2 and other products, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted CAB file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-11423", url: "https://www.suse.com/security/cve/CVE-2017-11423", }, { category: "external", summary: "SUSE Bug 1049423 for CVE-2017-11423", url: "https://bugzilla.suse.com/1049423", }, { category: "external", summary: "SUSE Bug 1083915 for CVE-2017-11423", url: "https://bugzilla.suse.com/1083915", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-11423", }, { cve: "CVE-2017-12374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12374", }, ], notes: [ { category: "general", text: "The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations (mbox.c operations on bounce messages). If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12374", url: "https://www.suse.com/security/cve/CVE-2017-12374", }, { category: "external", summary: "SUSE Bug 1077732 for CVE-2017-12374", url: "https://bugzilla.suse.com/1077732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-12374", }, { cve: "CVE-2017-12375", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12375", }, ], notes: [ { category: "general", text: "The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions (the rfc2047 function in mbox.c). An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12375", url: "https://www.suse.com/security/cve/CVE-2017-12375", }, { category: "external", summary: "SUSE Bug 1077732 for CVE-2017-12375", url: "https://bugzilla.suse.com/1077732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-12375", }, { cve: "CVE-2017-12376", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12376", }, ], notes: [ { category: "general", text: "ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause a handle_pdfname (in pdf.c) buffer overflow when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12376", url: "https://www.suse.com/security/cve/CVE-2017-12376", }, { category: "external", summary: "SUSE Bug 1077732 for CVE-2017-12376", url: "https://bugzilla.suse.com/1077732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-12376", }, { cve: "CVE-2017-12377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12377", }, ], notes: [ { category: "general", text: "ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap-based buffer over-read condition in mew.c when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12377", url: "https://www.suse.com/security/cve/CVE-2017-12377", }, { category: "external", summary: "SUSE Bug 1077732 for CVE-2017-12377", url: "https://bugzilla.suse.com/1077732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-12377", }, { cve: "CVE-2017-12378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12378", }, ], notes: [ { category: "general", text: "ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12378", url: "https://www.suse.com/security/cve/CVE-2017-12378", }, { category: "external", summary: "SUSE Bug 1077732 for CVE-2017-12378", url: "https://bugzilla.suse.com/1077732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-12378", }, { cve: "CVE-2017-12379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12379", }, ], notes: [ { category: "general", text: "ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in the message parsing function on an affected system. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a messageAddArgument (in message.c) buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition or execute arbitrary code on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12379", url: "https://www.suse.com/security/cve/CVE-2017-12379", }, { category: "external", summary: "SUSE Bug 1077732 for CVE-2017-12379", url: "https://bugzilla.suse.com/1077732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-12379", }, { cve: "CVE-2017-12380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12380", }, ], notes: [ { category: "general", text: "ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12380", url: "https://www.suse.com/security/cve/CVE-2017-12380", }, { category: "external", summary: "SUSE Bug 1077732 for CVE-2017-12380", url: "https://bugzilla.suse.com/1077732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-12380", }, { cve: "CVE-2017-6418", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6418", }, ], notes: [ { category: "general", text: "libclamav/message.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted e-mail message.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6418", url: "https://www.suse.com/security/cve/CVE-2017-6418", }, { category: "external", summary: "SUSE Bug 1052466 for CVE-2017-6418", url: "https://bugzilla.suse.com/1052466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-6418", }, { cve: "CVE-2017-6419", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6419", }, ], notes: [ { category: "general", text: "mspack/lzxd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted CHM file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6419", url: "https://www.suse.com/security/cve/CVE-2017-6419", }, { category: "external", summary: "SUSE Bug 1052449 for CVE-2017-6419", url: "https://bugzilla.suse.com/1052449", }, { category: "external", summary: "SUSE Bug 1083915 for CVE-2017-6419", url: "https://bugzilla.suse.com/1083915", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-6419", }, { cve: "CVE-2017-6420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6420", }, ], notes: [ { category: "general", text: "The wwunpack function in libclamav/wwunpack.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6420", url: "https://www.suse.com/security/cve/CVE-2017-6420", }, { category: "external", summary: "SUSE Bug 1052448 for CVE-2017-6420", url: "https://bugzilla.suse.com/1052448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-6420", }, { cve: "CVE-2018-0202", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-0202", }, ], notes: [ { category: "general", text: "clamscan in ClamAV before 0.99.4 contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause an out-of-bounds read when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition. This concerns pdf_parse_array and pdf_parse_string in libclamav/pdfng.c. Cisco Bug IDs: CSCvh91380, CSCvh91400.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-0202", url: "https://www.suse.com/security/cve/CVE-2018-0202", }, { category: "external", summary: "SUSE Bug 1083915 for CVE-2018-0202", url: "https://bugzilla.suse.com/1083915", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-0202", }, { cve: "CVE-2018-0360", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-0360", }, ], notes: [ { category: "general", text: "ClamAV before 0.100.1 has an HWP integer overflow with a resultant infinite loop via a crafted Hangul Word Processor file. This is in parsehwp3_paragraph() in libclamav/hwp.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-0360", url: "https://www.suse.com/security/cve/CVE-2018-0360", }, { category: "external", summary: "SUSE Bug 1101410 for CVE-2018-0360", url: "https://bugzilla.suse.com/1101410", }, { category: "external", summary: "SUSE Bug 1103091 for CVE-2018-0360", url: "https://bugzilla.suse.com/1103091", }, { category: "external", summary: "SUSE Bug 1103092 for CVE-2018-0360", url: "https://bugzilla.suse.com/1103092", }, { category: "external", summary: "SUSE Bug 1103099 for CVE-2018-0360", url: "https://bugzilla.suse.com/1103099", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-0360", }, { cve: "CVE-2018-0361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-0361", }, ], notes: [ { category: "general", text: "ClamAV before 0.100.1 lacks a PDF object length check, resulting in an unreasonably long time to parse a relatively small file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-0361", url: "https://www.suse.com/security/cve/CVE-2018-0361", }, { category: "external", summary: "SUSE Bug 1101410 for CVE-2018-0361", url: "https://bugzilla.suse.com/1101410", }, { category: "external", summary: "SUSE Bug 1101412 for CVE-2018-0361", url: "https://bugzilla.suse.com/1101412", }, { category: "external", summary: "SUSE Bug 1103091 for CVE-2018-0361", url: "https://bugzilla.suse.com/1103091", }, { category: "external", summary: "SUSE Bug 1103092 for CVE-2018-0361", url: "https://bugzilla.suse.com/1103092", }, { category: "external", summary: "SUSE Bug 1103099 for CVE-2018-0361", url: "https://bugzilla.suse.com/1103099", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-0361", }, { cve: "CVE-2018-1000085", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000085", }, ], notes: [ { category: "general", text: "ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000085", url: "https://www.suse.com/security/cve/CVE-2018-1000085", }, { category: "external", summary: "SUSE Bug 1082858 for CVE-2018-1000085", url: "https://bugzilla.suse.com/1082858", }, { category: "external", summary: "SUSE Bug 1083915 for CVE-2018-1000085", url: "https://bugzilla.suse.com/1083915", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1000085", }, { cve: "CVE-2018-14680", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14680", }, ], notes: [ { category: "general", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14680", url: "https://www.suse.com/security/cve/CVE-2018-14680", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14680", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14680", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14680", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14680", }, { cve: "CVE-2018-15378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15378", }, ], notes: [ { category: "general", text: "A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the \"unmew11()\" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15378", url: "https://www.suse.com/security/cve/CVE-2018-15378", }, { category: "external", summary: "SUSE Bug 1110723 for CVE-2018-15378", url: "https://bugzilla.suse.com/1110723", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-15378", }, { cve: "CVE-2019-12625", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12625", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12625", url: "https://www.suse.com/security/cve/CVE-2019-12625", }, { category: "external", summary: "SUSE Bug 1144504 for CVE-2019-12625", url: "https://bugzilla.suse.com/1144504", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-12625", }, { cve: "CVE-2019-12900", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12900", }, ], notes: [ { category: "general", text: "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12900", url: "https://www.suse.com/security/cve/CVE-2019-12900", }, { category: "external", summary: "SUSE Bug 1139083 for CVE-2019-12900", url: "https://bugzilla.suse.com/1139083", }, { category: "external", summary: "SUSE Bug 1141513 for CVE-2019-12900", url: "https://bugzilla.suse.com/1141513", }, { category: "external", summary: "SUSE Bug 1149458 for CVE-2019-12900", url: "https://bugzilla.suse.com/1149458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-12900", }, { cve: "CVE-2019-15961", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15961", }, ], notes: [ { category: "general", text: "A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15961", url: "https://www.suse.com/security/cve/CVE-2019-15961", }, { category: "external", summary: "SUSE Bug 1157763 for CVE-2019-15961", url: "https://bugzilla.suse.com/1157763", }, { category: "external", summary: "SUSE Bug 1180082 for CVE-2019-15961", url: "https://bugzilla.suse.com/1180082", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-15961", }, { cve: "CVE-2019-1785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1785", }, ], notes: [ { category: "general", text: "A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1785", url: "https://www.suse.com/security/cve/CVE-2019-1785", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1785", url: "https://bugzilla.suse.com/1130721", }, { category: "external", summary: "SUSE Bug 1137508 for CVE-2019-1785", url: "https://bugzilla.suse.com/1137508", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-1785", }, { cve: "CVE-2019-1786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1786", }, ], notes: [ { category: "general", text: "A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1786", url: "https://www.suse.com/security/cve/CVE-2019-1786", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1786", url: "https://bugzilla.suse.com/1130721", }, { category: "external", summary: "SUSE Bug 1137510 for CVE-2019-1786", url: "https://bugzilla.suse.com/1137510", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-1786", }, { cve: "CVE-2019-1787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1787", }, ], notes: [ { category: "general", text: "A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1787", url: "https://www.suse.com/security/cve/CVE-2019-1787", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1787", url: "https://bugzilla.suse.com/1130721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-1787", }, { cve: "CVE-2019-1788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1788", }, ], notes: [ { category: "general", text: "A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1788", url: "https://www.suse.com/security/cve/CVE-2019-1788", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1788", url: "https://bugzilla.suse.com/1130721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-1788", }, { cve: "CVE-2019-1789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1789", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1789", url: "https://www.suse.com/security/cve/CVE-2019-1789", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1789", url: "https://bugzilla.suse.com/1130721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-1789", }, { cve: "CVE-2019-1798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1798", }, ], notes: [ { category: "general", text: "A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1798", url: "https://www.suse.com/security/cve/CVE-2019-1798", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1798", url: "https://bugzilla.suse.com/1130721", }, { category: "external", summary: "SUSE Bug 1137513 for CVE-2019-1798", url: "https://bugzilla.suse.com/1137513", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-1798", }, { cve: "CVE-2020-3123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3123", }, ], notes: [ { category: "general", text: "A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3123", url: "https://www.suse.com/security/cve/CVE-2020-3123", }, { category: "external", summary: "SUSE Bug 1162921 for CVE-2020-3123", url: "https://bugzilla.suse.com/1162921", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-3123", }, { cve: "CVE-2020-3327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3327", }, ], notes: [ { category: "general", text: "A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3327", url: "https://www.suse.com/security/cve/CVE-2020-3327", }, { category: "external", summary: "SUSE Bug 1171980 for CVE-2020-3327", url: "https://bugzilla.suse.com/1171980", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3327", url: "https://bugzilla.suse.com/1174250", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-3327", }, { cve: "CVE-2020-3341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3341", }, ], notes: [ { category: "general", text: "A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3341", url: "https://www.suse.com/security/cve/CVE-2020-3341", }, { category: "external", summary: "SUSE Bug 1171981 for CVE-2020-3341", url: "https://bugzilla.suse.com/1171981", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-3341", }, { cve: "CVE-2020-3350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3350", }, ], notes: [ { category: "general", text: "A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the attacker to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3350", url: "https://www.suse.com/security/cve/CVE-2020-3350", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3350", url: "https://bugzilla.suse.com/1174250", }, { category: "external", summary: "SUSE Bug 1174255 for CVE-2020-3350", url: "https://bugzilla.suse.com/1174255", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-3350", }, { cve: "CVE-2020-3481", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3481", }, ], notes: [ { category: "general", text: "A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3481", url: "https://www.suse.com/security/cve/CVE-2020-3481", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3481", url: "https://bugzilla.suse.com/1174250", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-3481", }, { cve: "CVE-2021-1252", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-1252", }, ], notes: [ { category: "general", text: "A vulnerability in the Excel XLM macro parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper error handling that may result in an infinite loop. An attacker could exploit this vulnerability by sending a crafted Excel file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process hang, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-1252", url: "https://www.suse.com/security/cve/CVE-2021-1252", }, { category: "external", summary: "SUSE Bug 1184532 for CVE-2021-1252", url: "https://bugzilla.suse.com/1184532", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-1252", }, { cve: "CVE-2021-1404", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-1404", }, ], notes: [ { category: "general", text: "A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-1404", url: "https://www.suse.com/security/cve/CVE-2021-1404", }, { category: "external", summary: "SUSE Bug 1184533 for CVE-2021-1404", url: "https://bugzilla.suse.com/1184533", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-1404", }, { cve: "CVE-2021-1405", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-1405", }, ], notes: [ { category: "general", text: "A vulnerability in the email parsing module in Clam AntiVirus (ClamAV) Software version 0.103.1 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper variable initialization that may result in an NULL pointer read. An attacker could exploit this vulnerability by sending a crafted email to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-1405", url: "https://www.suse.com/security/cve/CVE-2021-1405", }, { category: "external", summary: "SUSE Bug 1184534 for CVE-2021-1405", url: "https://bugzilla.suse.com/1184534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-1405", }, ], }
opensuse-su-2019:2595-1
Vulnerability from csaf_opensuse
Published
2019-11-30 19:16
Modified
2019-11-30 19:16
Summary
Security update for clamav
Notes
Title of the patch
Security update for clamav
Description of the patch
This update for clamav fixes the following issues:
Security issue fixed:
- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).
Non-security issues fixed:
- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).
- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-2595
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).\n- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).\n\nNon-security issues fixed:\n\n- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).\n- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2019-2595", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2595-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2019:2595-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YQU33KHD533M6YFLZCXLG4HHJWYOHRXP/#YQU33KHD533M6YFLZCXLG4HHJWYOHRXP", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2019:2595-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YQU33KHD533M6YFLZCXLG4HHJWYOHRXP/#YQU33KHD533M6YFLZCXLG4HHJWYOHRXP", }, { category: "self", summary: "SUSE Bug 1144504", url: "https://bugzilla.suse.com/1144504", }, { category: "self", summary: "SUSE Bug 1149458", url: "https://bugzilla.suse.com/1149458", }, { category: "self", summary: "SUSE Bug 1151839", url: "https://bugzilla.suse.com/1151839", }, { category: "self", summary: "SUSE CVE CVE-2019-12625 page", url: "https://www.suse.com/security/cve/CVE-2019-12625/", }, { category: "self", summary: "SUSE CVE CVE-2019-12900 page", url: "https://www.suse.com/security/cve/CVE-2019-12900/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2019-11-30T19:16:50Z", generator: { date: "2019-11-30T19:16:50Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2019:2595-1", initial_release_date: "2019-11-30T19:16:50Z", revision_history: [ { date: "2019-11-30T19:16:50Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.100.3-lp151.2.3.1.x86_64", product: { name: "clamav-0.100.3-lp151.2.3.1.x86_64", product_id: "clamav-0.100.3-lp151.2.3.1.x86_64", }, }, { category: "product_version", name: "clamav-devel-0.100.3-lp151.2.3.1.x86_64", product: { name: "clamav-devel-0.100.3-lp151.2.3.1.x86_64", product_id: "clamav-devel-0.100.3-lp151.2.3.1.x86_64", }, }, { category: "product_version", name: "libclamav7-0.100.3-lp151.2.3.1.x86_64", product: { name: "libclamav7-0.100.3-lp151.2.3.1.x86_64", product_id: "libclamav7-0.100.3-lp151.2.3.1.x86_64", }, }, { category: "product_version", name: "libclammspack0-0.100.3-lp151.2.3.1.x86_64", product: { name: "libclammspack0-0.100.3-lp151.2.3.1.x86_64", product_id: "libclammspack0-0.100.3-lp151.2.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.1", product: { name: "openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-lp151.2.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:clamav-0.100.3-lp151.2.3.1.x86_64", }, product_reference: "clamav-0.100.3-lp151.2.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.100.3-lp151.2.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:clamav-devel-0.100.3-lp151.2.3.1.x86_64", }, product_reference: "clamav-devel-0.100.3-lp151.2.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "libclamav7-0.100.3-lp151.2.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:libclamav7-0.100.3-lp151.2.3.1.x86_64", }, product_reference: "libclamav7-0.100.3-lp151.2.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "libclammspack0-0.100.3-lp151.2.3.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:libclammspack0-0.100.3-lp151.2.3.1.x86_64", }, product_reference: "libclammspack0-0.100.3-lp151.2.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, ], }, vulnerabilities: [ { cve: "CVE-2019-12625", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12625", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:libclamav7-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:libclammspack0-0.100.3-lp151.2.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12625", url: "https://www.suse.com/security/cve/CVE-2019-12625", }, { category: "external", summary: "SUSE Bug 1144504 for CVE-2019-12625", url: "https://bugzilla.suse.com/1144504", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:libclamav7-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:libclammspack0-0.100.3-lp151.2.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:clamav-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:libclamav7-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:libclammspack0-0.100.3-lp151.2.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-30T19:16:50Z", details: "important", }, ], title: "CVE-2019-12625", }, { cve: "CVE-2019-12900", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12900", }, ], notes: [ { category: "general", text: "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:libclamav7-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:libclammspack0-0.100.3-lp151.2.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12900", url: "https://www.suse.com/security/cve/CVE-2019-12900", }, { category: "external", summary: "SUSE Bug 1139083 for CVE-2019-12900", url: "https://bugzilla.suse.com/1139083", }, { category: "external", summary: "SUSE Bug 1141513 for CVE-2019-12900", url: "https://bugzilla.suse.com/1141513", }, { category: "external", summary: "SUSE Bug 1149458 for CVE-2019-12900", url: "https://bugzilla.suse.com/1149458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:libclamav7-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:libclammspack0-0.100.3-lp151.2.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:clamav-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:libclamav7-0.100.3-lp151.2.3.1.x86_64", "openSUSE Leap 15.1:libclammspack0-0.100.3-lp151.2.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-30T19:16:50Z", details: "important", }, ], title: "CVE-2019-12900", }, ], }
opensuse-su-2019:2597-1
Vulnerability from csaf_opensuse
Published
2019-11-30 23:15
Modified
2019-11-30 23:15
Summary
Security update for clamav
Notes
Title of the patch
Security update for clamav
Description of the patch
This update for clamav fixes the following issues:
Security issue fixed:
- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).
Non-security issues fixed:
- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).
- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-2597
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).\n- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).\n\nNon-security issues fixed:\n\n- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).\n- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2019-2597", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2597-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2019:2597-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FTGJC4PRXW7J6W3FBYBCGEFTYIR4LIV6/#FTGJC4PRXW7J6W3FBYBCGEFTYIR4LIV6", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2019:2597-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FTGJC4PRXW7J6W3FBYBCGEFTYIR4LIV6/#FTGJC4PRXW7J6W3FBYBCGEFTYIR4LIV6", }, { category: "self", summary: "SUSE Bug 1144504", url: "https://bugzilla.suse.com/1144504", }, { category: "self", summary: "SUSE Bug 1149458", url: "https://bugzilla.suse.com/1149458", }, { category: "self", summary: "SUSE Bug 1151839", url: "https://bugzilla.suse.com/1151839", }, { category: "self", summary: "SUSE CVE CVE-2019-12625 page", url: "https://www.suse.com/security/cve/CVE-2019-12625/", }, { category: "self", summary: "SUSE CVE CVE-2019-12900 page", url: "https://www.suse.com/security/cve/CVE-2019-12900/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2019-11-30T23:15:50Z", generator: { date: "2019-11-30T23:15:50Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2019:2597-1", initial_release_date: "2019-11-30T23:15:50Z", revision_history: [ { date: "2019-11-30T23:15:50Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.100.3-lp150.2.13.1.x86_64", product: { name: "clamav-0.100.3-lp150.2.13.1.x86_64", product_id: "clamav-0.100.3-lp150.2.13.1.x86_64", }, }, { category: "product_version", name: "clamav-devel-0.100.3-lp150.2.13.1.x86_64", product: { name: "clamav-devel-0.100.3-lp150.2.13.1.x86_64", product_id: "clamav-devel-0.100.3-lp150.2.13.1.x86_64", }, }, { category: "product_version", name: "libclamav7-0.100.3-lp150.2.13.1.x86_64", product: { name: "libclamav7-0.100.3-lp150.2.13.1.x86_64", product_id: "libclamav7-0.100.3-lp150.2.13.1.x86_64", }, }, { category: "product_version", name: "libclammspack0-0.100.3-lp150.2.13.1.x86_64", product: { name: "libclammspack0-0.100.3-lp150.2.13.1.x86_64", product_id: "libclammspack0-0.100.3-lp150.2.13.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.0", product: { name: "openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.0", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.100.3-lp150.2.13.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:clamav-0.100.3-lp150.2.13.1.x86_64", }, product_reference: "clamav-0.100.3-lp150.2.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.100.3-lp150.2.13.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:clamav-devel-0.100.3-lp150.2.13.1.x86_64", }, product_reference: "clamav-devel-0.100.3-lp150.2.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "libclamav7-0.100.3-lp150.2.13.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:libclamav7-0.100.3-lp150.2.13.1.x86_64", }, product_reference: "libclamav7-0.100.3-lp150.2.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "libclammspack0-0.100.3-lp150.2.13.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:libclammspack0-0.100.3-lp150.2.13.1.x86_64", }, product_reference: "libclammspack0-0.100.3-lp150.2.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, ], }, vulnerabilities: [ { cve: "CVE-2019-12625", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12625", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:clamav-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:clamav-devel-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:libclamav7-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:libclammspack0-0.100.3-lp150.2.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12625", url: "https://www.suse.com/security/cve/CVE-2019-12625", }, { category: "external", summary: "SUSE Bug 1144504 for CVE-2019-12625", url: "https://bugzilla.suse.com/1144504", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:clamav-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:clamav-devel-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:libclamav7-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:libclammspack0-0.100.3-lp150.2.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.0:clamav-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:clamav-devel-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:libclamav7-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:libclammspack0-0.100.3-lp150.2.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-30T23:15:50Z", details: "important", }, ], title: "CVE-2019-12625", }, { cve: "CVE-2019-12900", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12900", }, ], notes: [ { category: "general", text: "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:clamav-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:clamav-devel-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:libclamav7-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:libclammspack0-0.100.3-lp150.2.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12900", url: "https://www.suse.com/security/cve/CVE-2019-12900", }, { category: "external", summary: "SUSE Bug 1139083 for CVE-2019-12900", url: "https://bugzilla.suse.com/1139083", }, { category: "external", summary: "SUSE Bug 1141513 for CVE-2019-12900", url: "https://bugzilla.suse.com/1141513", }, { category: "external", summary: "SUSE Bug 1149458 for CVE-2019-12900", url: "https://bugzilla.suse.com/1149458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:clamav-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:clamav-devel-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:libclamav7-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:libclammspack0-0.100.3-lp150.2.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.0:clamav-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:clamav-devel-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:libclamav7-0.100.3-lp150.2.13.1.x86_64", "openSUSE Leap 15.0:libclammspack0-0.100.3-lp150.2.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-11-30T23:15:50Z", details: "important", }, ], title: "CVE-2019-12900", }, ], }
opensuse-su-2020:2268-1
Vulnerability from csaf_opensuse
Published
2020-12-17 15:24
Modified
2020-12-17 15:24
Summary
Security update for clamav
Notes
Title of the patch
Security update for clamav
Description of the patch
This update for clamav fixes the following issues:
clamav was updated to the new major release 0.103.0. (jsc#ECO-3010,bsc#1118459)
Note that libclamav was changed incompatible, if you have a 3rd party
application that uses libclamav, it needs to be rebuilt.
Update to 0.103.0
* clamd can now reload the signature database without blocking
scanning. This multi-threaded database reload improvement was made
possible thanks to a community effort.
- Non-blocking database reloads are now the default behavior. Some
systems that are more constrained on RAM may need to disable
non-blocking reloads as it will temporarily consume two times as
much memory. We added a new clamd config option
ConcurrentDatabaseReload, which may be set to no.
* Fix clamav-milter.service (requires clamd.service to run)
Update to 0.102.4
* CVE-2020-3350: Fix a vulnerability wherein a malicious user could
replace a scan target's directory with a symlink to another path
to trick clamscan, clamdscan, or clamonacc into removing or moving
a different file (eg. a critical system file). The issue would
affect users that use the --move or --remove options for clamscan,
clamdscan, and clamonacc.
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
module in ClamAV 0.102.3 that could cause a Denial-of-Service
(DoS) condition. Improper bounds checking results in an
out-of-bounds read which could cause a crash. The previous fix for
this CVE in 0.102.3 was incomplete. This fix correctly resolves
the issue.
* CVE-2020-3481: Fix a vulnerability in the EGG archive module in
ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
condition. Improper error handling may result in a crash due to a
NULL pointer dereference. This vulnerability is mitigated for
those using the official ClamAV signature databases because the
file type signatures in daily.cvd will not enable the EGG archive
parser in versions affected by the vulnerability.
Update to 0.102.3
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
module in ClamAV 0.102.2 that could cause a Denial-of-Service (DoS)
condition. Improper bounds checking of an unsigned variable results
in an out-of-bounds read which causes a crash.
* CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
condition. Improper size checking of a buffer used to initialize AES
decryption routines results in an out-of-bounds read which may cause
a crash.
* Fix 'Attempt to allocate 0 bytes' error when parsing some PDF
documents.
* Fix a couple of minor memory leaks.
* Updated libclamunrar to UnRAR 5.9.2.
Update to 0.102.2:
* CVE-2020-3123: A denial-of-service (DoS) condition may occur when
using the optional credit card data-loss-prevention (DLP) feature.
Improper bounds checking of an unsigned variable resulted in an
out-of-bounds read, which causes a crash.
* Significantly improved the scan speed of PDF files on Windows.
* Re-applied a fix to alleviate file access issues when scanning RAR
files in downstream projects that use libclamav where the scanning
engine is operating in a low-privilege process. This bug was originally
fixed in 0.101.2 and the fix was mistakenly omitted from 0.102.0.
* Fixed an issue where freshclam failed to update if the database version
downloaded is one version older than advertised. This situation may
occur after a new database version is published. The issue affected
users downloading the whole CVD database file.
* Changed the default freshclam ReceiveTimeout setting to 0 (infinite).
The ReceiveTimeout had caused needless database update failures for
users with slower internet connections.
* Correctly display the number of kilobytes (KiB) in progress bar and
reduced the size of the progress bar to accommodate 80-character width
terminals.
* Fixed an issue where running freshclam manually causes a daemonized
freshclam process to fail when it updates because the manual instance
deletes the temporary download directory. The freshclam temporary files
will now download to a unique directory created at the time of an update
instead of using a hardcoded directory created/destroyed at the program
start/exit.
* Fix for freshclam's OnOutdatedExecute config option.
* Fixes a memory leak in the error condition handling for the email
parser.
* Improved bound checking and error handling in ARJ archive parser.
* Improved error handling in PDF parser.
* Fix for memory leak in byte-compare signature handler.
- The freshclam.service should not be started before the network is
online (it checks for updates immediately upon service start)
Update to 0.102.1:
* CVE-2019-15961, bsc#1157763: A Denial-of-Service (DoS)
vulnerability may occur when scanning a specially crafted email
file as a result of excessively long scan times. The issue is
resolved by implementing several maximums in parsing MIME
messages and by optimizing use of memory allocation.
* Build system fixes to build clamav-milter, to correctly link
with libxml2 when detected, and to correctly detect fanotify
for on-access scanning feature support.
* Signature load time is significantly reduced by changing to a
more efficient algorithm for loading signature patterns and
allocating the AC trie. Patch courtesy of Alberto Wu.
* Introduced a new configure option to statically link libjson-c
with libclamav. Static linking with libjson is highly
recommended to prevent crashes in applications that use
libclamav alongside another JSON parsing library.
* Null-dereference fix in email parser when using the
--gen-json metadata option.
* Fixes for Authenticode parsing and certificate signature
(.crb database) bugs.
Update to 0.102.0:
* The On-Access Scanning feature has been migrated out of clamd
and into a brand new utility named clamonacc. This utility is
similar to clamdscan and clamav-milter in that it acts as a
client to clamd. This separation from clamd means that clamd no
longer needs to run with root privileges while scanning potentially
malicious files. Instead, clamd may drop privileges to run under an
account that does not have super-user. In addition to improving the
security posture of running clamd with On-Access enabled, this
update fixed a few outstanding defects:
- On-Access scanning for created and moved files (Extra-Scanning)
is fixed.
- VirusEvent for On-Access scans is fixed.
- With clamonacc, it is now possible to copy, move, or remove a
file if the scan triggered an alert, just like with clamdscan.
* The freshclam database update utility has undergone a significant
update. This includes:
- Added support for HTTPS.
- Support for database mirrors hosted on ports other than 80.
- Removal of the mirror management feature (mirrors.dat).
- An all new libfreshclam library API.
- created new subpackage libfreshclam2
Update to 0.101.4:
* CVE-2019-12900: An out of bounds write in the NSIS bzip2
(bsc#1149458)
* CVE-2019-12625: Introduce a configurable time limit to mitigate
zip bomb vulnerability completely. Default is 2 minutes,
configurable useing the clamscan --max-scantime and for clamd
using the MaxScanTime config option (bsc#1144504)
Update to version 0.101.3:
* bsc#1144504: ZIP bomb causes extreme CPU spikes
Update to version 0.101.2 (bsc#1130721)
* CVE-2019-1787:
An out-of-bounds heap read condition may occur when scanning PDF
documents. The defect is a failure to correctly keep track of the number
of bytes remaining in a buffer when indexing file data.
* CVE-2019-1789:
An out-of-bounds heap read condition may occur when scanning PE files
(i.e. Windows EXE and DLL files) that have been packed using Aspack as a
result of inadequate bound-checking.
* CVE-2019-1788:
An out-of-bounds heap write condition may occur when scanning OLE2 files
such as Microsoft Office 97-2003 documents. The invalid write happens when
an invalid pointer is mistakenly used to initialize a 32bit integer to
zero. This is likely to crash the application.
* CVE-2019-1786:
An out-of-bounds heap read condition may occur when scanning malformed
PDF documents as a result of improper bounds-checking.
* CVE-2019-1785:
A path-traversal write condition may occur as a result of improper
input validation when scanning RAR archives.
* CVE-2019-1798:
A use-after-free condition may occur as a result of improper error
handling when scanning nested RAR archives.
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2020-2268
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\nclamav was updated to the new major release 0.103.0. (jsc#ECO-3010,bsc#1118459)\n\nNote that libclamav was changed incompatible, if you have a 3rd party\napplication that uses libclamav, it needs to be rebuilt.\n\nUpdate to 0.103.0\n\n* clamd can now reload the signature database without blocking\n scanning. This multi-threaded database reload improvement was made\n possible thanks to a community effort.\n\n - Non-blocking database reloads are now the default behavior. Some\n systems that are more constrained on RAM may need to disable\n non-blocking reloads as it will temporarily consume two times as\n much memory. We added a new clamd config option\n ConcurrentDatabaseReload, which may be set to no.\n\n * Fix clamav-milter.service (requires clamd.service to run)\n\nUpdate to 0.102.4\n\n * CVE-2020-3350: Fix a vulnerability wherein a malicious user could\n replace a scan target's directory with a symlink to another path\n to trick clamscan, clamdscan, or clamonacc into removing or moving\n a different file (eg. a critical system file). The issue would\n affect users that use the --move or --remove options for clamscan,\n clamdscan, and clamonacc.\n * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing\n module in ClamAV 0.102.3 that could cause a Denial-of-Service\n (DoS) condition. Improper bounds checking results in an\n out-of-bounds read which could cause a crash. The previous fix for\n this CVE in 0.102.3 was incomplete. This fix correctly resolves\n the issue.\n * CVE-2020-3481: Fix a vulnerability in the EGG archive module in\n ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)\n condition. Improper error handling may result in a crash due to a\n NULL pointer dereference. This vulnerability is mitigated for\n those using the official ClamAV signature databases because the\n file type signatures in daily.cvd will not enable the EGG archive\n parser in versions affected by the vulnerability.\n\nUpdate to 0.102.3\n\n * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing\n module in ClamAV 0.102.2 that could cause a Denial-of-Service (DoS)\n condition. Improper bounds checking of an unsigned variable results\n in an out-of-bounds read which causes a crash.\n * CVE-2020-3341: Fix a vulnerability in the PDF parsing module in\n ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)\n condition. Improper size checking of a buffer used to initialize AES\n decryption routines results in an out-of-bounds read which may cause\n a crash.\n * Fix 'Attempt to allocate 0 bytes' error when parsing some PDF\n documents.\n * Fix a couple of minor memory leaks.\n * Updated libclamunrar to UnRAR 5.9.2.\n\nUpdate to 0.102.2:\n\n * CVE-2020-3123: A denial-of-service (DoS) condition may occur when\n using the optional credit card data-loss-prevention (DLP) feature.\n Improper bounds checking of an unsigned variable resulted in an\n out-of-bounds read, which causes a crash.\n * Significantly improved the scan speed of PDF files on Windows.\n * Re-applied a fix to alleviate file access issues when scanning RAR\n files in downstream projects that use libclamav where the scanning\n engine is operating in a low-privilege process. This bug was originally\n fixed in 0.101.2 and the fix was mistakenly omitted from 0.102.0.\n * Fixed an issue where freshclam failed to update if the database version\n downloaded is one version older than advertised. This situation may\n occur after a new database version is published. The issue affected\n users downloading the whole CVD database file.\n * Changed the default freshclam ReceiveTimeout setting to 0 (infinite).\n The ReceiveTimeout had caused needless database update failures for\n users with slower internet connections.\n * Correctly display the number of kilobytes (KiB) in progress bar and\n reduced the size of the progress bar to accommodate 80-character width\n terminals.\n * Fixed an issue where running freshclam manually causes a daemonized\n freshclam process to fail when it updates because the manual instance\n deletes the temporary download directory. The freshclam temporary files\n will now download to a unique directory created at the time of an update\n instead of using a hardcoded directory created/destroyed at the program\n start/exit.\n * Fix for freshclam's OnOutdatedExecute config option.\n * Fixes a memory leak in the error condition handling for the email\n parser.\n * Improved bound checking and error handling in ARJ archive parser.\n * Improved error handling in PDF parser.\n * Fix for memory leak in byte-compare signature handler.\n\n- The freshclam.service should not be started before the network is\n online (it checks for updates immediately upon service start)\n\nUpdate to 0.102.1:\n\n * CVE-2019-15961, bsc#1157763: A Denial-of-Service (DoS)\n vulnerability may occur when scanning a specially crafted email\n file as a result of excessively long scan times. The issue is\n resolved by implementing several maximums in parsing MIME\n messages and by optimizing use of memory allocation.\n * Build system fixes to build clamav-milter, to correctly link\n with libxml2 when detected, and to correctly detect fanotify\n for on-access scanning feature support.\n * Signature load time is significantly reduced by changing to a\n more efficient algorithm for loading signature patterns and\n allocating the AC trie. Patch courtesy of Alberto Wu.\n * Introduced a new configure option to statically link libjson-c\n with libclamav. Static linking with libjson is highly\n recommended to prevent crashes in applications that use\n libclamav alongside another JSON parsing library.\n * Null-dereference fix in email parser when using the\n --gen-json metadata option.\n * Fixes for Authenticode parsing and certificate signature\n (.crb database) bugs.\n\nUpdate to 0.102.0:\n\n * The On-Access Scanning feature has been migrated out of clamd\n and into a brand new utility named clamonacc. This utility is\n similar to clamdscan and clamav-milter in that it acts as a\n client to clamd. This separation from clamd means that clamd no\n longer needs to run with root privileges while scanning potentially\n malicious files. Instead, clamd may drop privileges to run under an\n account that does not have super-user. In addition to improving the\n security posture of running clamd with On-Access enabled, this\n update fixed a few outstanding defects:\n - On-Access scanning for created and moved files (Extra-Scanning)\n is fixed.\n - VirusEvent for On-Access scans is fixed.\n - With clamonacc, it is now possible to copy, move, or remove a\n file if the scan triggered an alert, just like with clamdscan.\n * The freshclam database update utility has undergone a significant\n update. This includes:\n - Added support for HTTPS.\n - Support for database mirrors hosted on ports other than 80.\n - Removal of the mirror management feature (mirrors.dat).\n - An all new libfreshclam library API.\n- created new subpackage libfreshclam2\n\nUpdate to 0.101.4:\n\n * CVE-2019-12900: An out of bounds write in the NSIS bzip2\n (bsc#1149458)\n * CVE-2019-12625: Introduce a configurable time limit to mitigate\n zip bomb vulnerability completely. Default is 2 minutes,\n configurable useing the clamscan --max-scantime and for clamd\n using the MaxScanTime config option (bsc#1144504)\n\nUpdate to version 0.101.3:\n\n * bsc#1144504: ZIP bomb causes extreme CPU spikes\n\nUpdate to version 0.101.2 (bsc#1130721)\n\n * CVE-2019-1787:\n An out-of-bounds heap read condition may occur when scanning PDF\n documents. The defect is a failure to correctly keep track of the number\n of bytes remaining in a buffer when indexing file data.\n * CVE-2019-1789:\n An out-of-bounds heap read condition may occur when scanning PE files\n (i.e. Windows EXE and DLL files) that have been packed using Aspack as a\n result of inadequate bound-checking.\n * CVE-2019-1788:\n An out-of-bounds heap write condition may occur when scanning OLE2 files\n such as Microsoft Office 97-2003 documents. The invalid write happens when\n an invalid pointer is mistakenly used to initialize a 32bit integer to\n zero. This is likely to crash the application.\n * CVE-2019-1786:\n An out-of-bounds heap read condition may occur when scanning malformed\n PDF documents as a result of improper bounds-checking.\n * CVE-2019-1785:\n A path-traversal write condition may occur as a result of improper\n input validation when scanning RAR archives.\n * CVE-2019-1798:\n A use-after-free condition may occur as a result of improper error\n handling when scanning nested RAR archives.\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2020-2268", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_2268-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2020:2268-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2020:2268-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/", }, { category: "self", summary: "SUSE Bug 1104457", url: "https://bugzilla.suse.com/1104457", }, { category: "self", summary: "SUSE Bug 1118459", url: "https://bugzilla.suse.com/1118459", }, { category: "self", summary: "SUSE Bug 1130721", url: "https://bugzilla.suse.com/1130721", }, { category: "self", summary: "SUSE Bug 1144504", url: "https://bugzilla.suse.com/1144504", }, { category: "self", summary: "SUSE Bug 1149458", url: "https://bugzilla.suse.com/1149458", }, { category: "self", summary: "SUSE Bug 1157763", url: "https://bugzilla.suse.com/1157763", }, { category: "self", summary: "SUSE CVE CVE-2019-12625 page", url: "https://www.suse.com/security/cve/CVE-2019-12625/", }, { category: "self", summary: "SUSE CVE CVE-2019-12900 page", url: "https://www.suse.com/security/cve/CVE-2019-12900/", }, { category: "self", summary: "SUSE CVE CVE-2019-15961 page", url: "https://www.suse.com/security/cve/CVE-2019-15961/", }, { category: "self", summary: "SUSE CVE CVE-2019-1785 page", url: "https://www.suse.com/security/cve/CVE-2019-1785/", }, { category: "self", summary: "SUSE CVE CVE-2019-1786 page", url: "https://www.suse.com/security/cve/CVE-2019-1786/", }, { category: "self", summary: "SUSE CVE CVE-2019-1787 page", url: "https://www.suse.com/security/cve/CVE-2019-1787/", }, { category: "self", summary: "SUSE CVE CVE-2019-1788 page", url: "https://www.suse.com/security/cve/CVE-2019-1788/", }, { category: "self", summary: "SUSE CVE CVE-2019-1789 page", url: "https://www.suse.com/security/cve/CVE-2019-1789/", }, { category: "self", summary: "SUSE CVE CVE-2019-1798 page", url: "https://www.suse.com/security/cve/CVE-2019-1798/", }, { category: "self", summary: "SUSE CVE CVE-2020-3123 page", url: "https://www.suse.com/security/cve/CVE-2020-3123/", }, { category: "self", summary: "SUSE CVE CVE-2020-3327 page", url: "https://www.suse.com/security/cve/CVE-2020-3327/", }, { category: "self", summary: "SUSE CVE CVE-2020-3341 page", url: "https://www.suse.com/security/cve/CVE-2020-3341/", }, { category: "self", summary: "SUSE CVE CVE-2020-3350 page", url: "https://www.suse.com/security/cve/CVE-2020-3350/", }, { category: "self", summary: "SUSE CVE CVE-2020-3481 page", url: "https://www.suse.com/security/cve/CVE-2020-3481/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2020-12-17T15:24:14Z", generator: { date: "2020-12-17T15:24:14Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2020:2268-1", initial_release_date: "2020-12-17T15:24:14Z", revision_history: [ { date: "2020-12-17T15:24:14Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.103.0-lp151.2.12.1.x86_64", product: { name: "clamav-0.103.0-lp151.2.12.1.x86_64", product_id: "clamav-0.103.0-lp151.2.12.1.x86_64", }, }, { category: "product_version", name: "clamav-devel-0.103.0-lp151.2.12.1.x86_64", product: { name: "clamav-devel-0.103.0-lp151.2.12.1.x86_64", product_id: "clamav-devel-0.103.0-lp151.2.12.1.x86_64", }, }, { category: "product_version", name: "libclamav9-0.103.0-lp151.2.12.1.x86_64", product: { name: "libclamav9-0.103.0-lp151.2.12.1.x86_64", product_id: "libclamav9-0.103.0-lp151.2.12.1.x86_64", }, }, { category: "product_version", name: "libfreshclam2-0.103.0-lp151.2.12.1.x86_64", product: { name: "libfreshclam2-0.103.0-lp151.2.12.1.x86_64", product_id: "libfreshclam2-0.103.0-lp151.2.12.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.1", product: { name: "openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-lp151.2.12.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", }, product_reference: "clamav-0.103.0-lp151.2.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.0-lp151.2.12.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", }, product_reference: "clamav-devel-0.103.0-lp151.2.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.0-lp151.2.12.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", }, product_reference: "libclamav9-0.103.0-lp151.2.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.0-lp151.2.12.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", }, product_reference: "libfreshclam2-0.103.0-lp151.2.12.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, ], }, vulnerabilities: [ { cve: "CVE-2019-12625", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12625", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12625", url: "https://www.suse.com/security/cve/CVE-2019-12625", }, { category: "external", summary: "SUSE Bug 1144504 for CVE-2019-12625", url: "https://bugzilla.suse.com/1144504", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-17T15:24:14Z", details: "important", }, ], title: "CVE-2019-12625", }, { cve: "CVE-2019-12900", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12900", }, ], notes: [ { category: "general", text: "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12900", url: "https://www.suse.com/security/cve/CVE-2019-12900", }, { category: "external", summary: "SUSE Bug 1139083 for CVE-2019-12900", url: "https://bugzilla.suse.com/1139083", }, { category: "external", summary: "SUSE Bug 1141513 for CVE-2019-12900", url: "https://bugzilla.suse.com/1141513", }, { category: "external", summary: "SUSE Bug 1149458 for CVE-2019-12900", url: "https://bugzilla.suse.com/1149458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-17T15:24:14Z", details: "important", }, ], title: "CVE-2019-12900", }, { cve: "CVE-2019-15961", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15961", }, ], notes: [ { category: "general", text: "A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15961", url: "https://www.suse.com/security/cve/CVE-2019-15961", }, { category: "external", summary: "SUSE Bug 1157763 for CVE-2019-15961", url: "https://bugzilla.suse.com/1157763", }, { category: "external", summary: "SUSE Bug 1180082 for CVE-2019-15961", url: "https://bugzilla.suse.com/1180082", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-17T15:24:14Z", details: "important", }, ], title: "CVE-2019-15961", }, { cve: "CVE-2019-1785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1785", }, ], notes: [ { category: "general", text: "A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1785", url: "https://www.suse.com/security/cve/CVE-2019-1785", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1785", url: "https://bugzilla.suse.com/1130721", }, { category: "external", summary: "SUSE Bug 1137508 for CVE-2019-1785", url: "https://bugzilla.suse.com/1137508", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-17T15:24:14Z", details: "low", }, ], title: "CVE-2019-1785", }, { cve: "CVE-2019-1786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1786", }, ], notes: [ { category: "general", text: "A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1786", url: "https://www.suse.com/security/cve/CVE-2019-1786", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1786", url: "https://bugzilla.suse.com/1130721", }, { category: "external", summary: "SUSE Bug 1137510 for CVE-2019-1786", url: "https://bugzilla.suse.com/1137510", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-17T15:24:14Z", details: "moderate", }, ], title: "CVE-2019-1786", }, { cve: "CVE-2019-1787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1787", }, ], notes: [ { category: "general", text: "A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1787", url: "https://www.suse.com/security/cve/CVE-2019-1787", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1787", url: "https://bugzilla.suse.com/1130721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-17T15:24:14Z", details: "important", }, ], title: "CVE-2019-1787", }, { cve: "CVE-2019-1788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1788", }, ], notes: [ { category: "general", text: "A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1788", url: "https://www.suse.com/security/cve/CVE-2019-1788", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1788", url: "https://bugzilla.suse.com/1130721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-17T15:24:14Z", details: "important", }, ], title: "CVE-2019-1788", }, { cve: "CVE-2019-1789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1789", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1789", url: "https://www.suse.com/security/cve/CVE-2019-1789", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1789", url: "https://bugzilla.suse.com/1130721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-17T15:24:14Z", details: "important", }, ], title: "CVE-2019-1789", }, { cve: "CVE-2019-1798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1798", }, ], notes: [ { category: "general", text: "A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1798", url: "https://www.suse.com/security/cve/CVE-2019-1798", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1798", url: "https://bugzilla.suse.com/1130721", }, { category: "external", summary: "SUSE Bug 1137513 for CVE-2019-1798", url: "https://bugzilla.suse.com/1137513", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-17T15:24:14Z", details: "important", }, ], title: "CVE-2019-1798", }, { cve: "CVE-2020-3123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3123", }, ], notes: [ { category: "general", text: "A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3123", url: "https://www.suse.com/security/cve/CVE-2020-3123", }, { category: "external", summary: "SUSE Bug 1162921 for CVE-2020-3123", url: "https://bugzilla.suse.com/1162921", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-17T15:24:14Z", details: "important", }, ], title: "CVE-2020-3123", }, { cve: "CVE-2020-3327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3327", }, ], notes: [ { category: "general", text: "A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3327", url: "https://www.suse.com/security/cve/CVE-2020-3327", }, { category: "external", summary: "SUSE Bug 1171980 for CVE-2020-3327", url: "https://bugzilla.suse.com/1171980", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3327", url: "https://bugzilla.suse.com/1174250", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-17T15:24:14Z", details: "important", }, ], title: "CVE-2020-3327", }, { cve: "CVE-2020-3341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3341", }, ], notes: [ { category: "general", text: "A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3341", url: "https://www.suse.com/security/cve/CVE-2020-3341", }, { category: "external", summary: "SUSE Bug 1171981 for CVE-2020-3341", url: "https://bugzilla.suse.com/1171981", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-17T15:24:14Z", details: "important", }, ], title: "CVE-2020-3341", }, { cve: "CVE-2020-3350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3350", }, ], notes: [ { category: "general", text: "A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the attacker to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3350", url: "https://www.suse.com/security/cve/CVE-2020-3350", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3350", url: "https://bugzilla.suse.com/1174250", }, { category: "external", summary: "SUSE Bug 1174255 for CVE-2020-3350", url: "https://bugzilla.suse.com/1174255", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-17T15:24:14Z", details: "moderate", }, ], title: "CVE-2020-3350", }, { cve: "CVE-2020-3481", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3481", }, ], notes: [ { category: "general", text: "A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3481", url: "https://www.suse.com/security/cve/CVE-2020-3481", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3481", url: "https://bugzilla.suse.com/1174250", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:clamav-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:clamav-devel-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libclamav9-0.103.0-lp151.2.12.1.x86_64", "openSUSE Leap 15.1:libfreshclam2-0.103.0-lp151.2.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-17T15:24:14Z", details: "important", }, ], title: "CVE-2020-3481", }, ], }
opensuse-su-2020:2276-1
Vulnerability from csaf_opensuse
Published
2020-12-18 05:23
Modified
2020-12-18 05:23
Summary
Security update for clamav
Notes
Title of the patch
Security update for clamav
Description of the patch
This update for clamav fixes the following issues:
clamav was updated to the new major release 0.103.0. (jsc#ECO-3010,bsc#1118459)
Note that libclamav was changed incompatible, if you have a 3rd party
application that uses libclamav, it needs to be rebuilt.
Update to 0.103.0
* clamd can now reload the signature database without blocking
scanning. This multi-threaded database reload improvement was made
possible thanks to a community effort.
- Non-blocking database reloads are now the default behavior. Some
systems that are more constrained on RAM may need to disable
non-blocking reloads as it will temporarily consume two times as
much memory. We added a new clamd config option
ConcurrentDatabaseReload, which may be set to no.
* Fix clamav-milter.service (requires clamd.service to run)
Update to 0.102.4
* CVE-2020-3350: Fix a vulnerability wherein a malicious user could
replace a scan target's directory with a symlink to another path
to trick clamscan, clamdscan, or clamonacc into removing or moving
a different file (eg. a critical system file). The issue would
affect users that use the --move or --remove options for clamscan,
clamdscan, and clamonacc.
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
module in ClamAV 0.102.3 that could cause a Denial-of-Service
(DoS) condition. Improper bounds checking results in an
out-of-bounds read which could cause a crash. The previous fix for
this CVE in 0.102.3 was incomplete. This fix correctly resolves
the issue.
* CVE-2020-3481: Fix a vulnerability in the EGG archive module in
ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
condition. Improper error handling may result in a crash due to a
NULL pointer dereference. This vulnerability is mitigated for
those using the official ClamAV signature databases because the
file type signatures in daily.cvd will not enable the EGG archive
parser in versions affected by the vulnerability.
Update to 0.102.3
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
module in ClamAV 0.102.2 that could cause a Denial-of-Service (DoS)
condition. Improper bounds checking of an unsigned variable results
in an out-of-bounds read which causes a crash.
* CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
condition. Improper size checking of a buffer used to initialize AES
decryption routines results in an out-of-bounds read which may cause
a crash.
* Fix 'Attempt to allocate 0 bytes' error when parsing some PDF
documents.
* Fix a couple of minor memory leaks.
* Updated libclamunrar to UnRAR 5.9.2.
Update to 0.102.2:
* CVE-2020-3123: A denial-of-service (DoS) condition may occur when
using the optional credit card data-loss-prevention (DLP) feature.
Improper bounds checking of an unsigned variable resulted in an
out-of-bounds read, which causes a crash.
* Significantly improved the scan speed of PDF files on Windows.
* Re-applied a fix to alleviate file access issues when scanning RAR
files in downstream projects that use libclamav where the scanning
engine is operating in a low-privilege process. This bug was originally
fixed in 0.101.2 and the fix was mistakenly omitted from 0.102.0.
* Fixed an issue where freshclam failed to update if the database version
downloaded is one version older than advertised. This situation may
occur after a new database version is published. The issue affected
users downloading the whole CVD database file.
* Changed the default freshclam ReceiveTimeout setting to 0 (infinite).
The ReceiveTimeout had caused needless database update failures for
users with slower internet connections.
* Correctly display the number of kilobytes (KiB) in progress bar and
reduced the size of the progress bar to accommodate 80-character width
terminals.
* Fixed an issue where running freshclam manually causes a daemonized
freshclam process to fail when it updates because the manual instance
deletes the temporary download directory. The freshclam temporary files
will now download to a unique directory created at the time of an update
instead of using a hardcoded directory created/destroyed at the program
start/exit.
* Fix for freshclam's OnOutdatedExecute config option.
* Fixes a memory leak in the error condition handling for the email
parser.
* Improved bound checking and error handling in ARJ archive parser.
* Improved error handling in PDF parser.
* Fix for memory leak in byte-compare signature handler.
- The freshclam.service should not be started before the network is
online (it checks for updates immediately upon service start)
Update to 0.102.1:
* CVE-2019-15961, bsc#1157763: A Denial-of-Service (DoS)
vulnerability may occur when scanning a specially crafted email
file as a result of excessively long scan times. The issue is
resolved by implementing several maximums in parsing MIME
messages and by optimizing use of memory allocation.
* Build system fixes to build clamav-milter, to correctly link
with libxml2 when detected, and to correctly detect fanotify
for on-access scanning feature support.
* Signature load time is significantly reduced by changing to a
more efficient algorithm for loading signature patterns and
allocating the AC trie. Patch courtesy of Alberto Wu.
* Introduced a new configure option to statically link libjson-c
with libclamav. Static linking with libjson is highly
recommended to prevent crashes in applications that use
libclamav alongside another JSON parsing library.
* Null-dereference fix in email parser when using the
--gen-json metadata option.
* Fixes for Authenticode parsing and certificate signature
(.crb database) bugs.
Update to 0.102.0:
* The On-Access Scanning feature has been migrated out of clamd
and into a brand new utility named clamonacc. This utility is
similar to clamdscan and clamav-milter in that it acts as a
client to clamd. This separation from clamd means that clamd no
longer needs to run with root privileges while scanning potentially
malicious files. Instead, clamd may drop privileges to run under an
account that does not have super-user. In addition to improving the
security posture of running clamd with On-Access enabled, this
update fixed a few outstanding defects:
- On-Access scanning for created and moved files (Extra-Scanning)
is fixed.
- VirusEvent for On-Access scans is fixed.
- With clamonacc, it is now possible to copy, move, or remove a
file if the scan triggered an alert, just like with clamdscan.
* The freshclam database update utility has undergone a significant
update. This includes:
- Added support for HTTPS.
- Support for database mirrors hosted on ports other than 80.
- Removal of the mirror management feature (mirrors.dat).
- An all new libfreshclam library API.
- created new subpackage libfreshclam2
Update to 0.101.4:
* CVE-2019-12900: An out of bounds write in the NSIS bzip2
(bsc#1149458)
* CVE-2019-12625: Introduce a configurable time limit to mitigate
zip bomb vulnerability completely. Default is 2 minutes,
configurable useing the clamscan --max-scantime and for clamd
using the MaxScanTime config option (bsc#1144504)
Update to version 0.101.3:
* bsc#1144504: ZIP bomb causes extreme CPU spikes
Update to version 0.101.2 (bsc#1130721)
* CVE-2019-1787:
An out-of-bounds heap read condition may occur when scanning PDF
documents. The defect is a failure to correctly keep track of the number
of bytes remaining in a buffer when indexing file data.
* CVE-2019-1789:
An out-of-bounds heap read condition may occur when scanning PE files
(i.e. Windows EXE and DLL files) that have been packed using Aspack as a
result of inadequate bound-checking.
* CVE-2019-1788:
An out-of-bounds heap write condition may occur when scanning OLE2 files
such as Microsoft Office 97-2003 documents. The invalid write happens when
an invalid pointer is mistakenly used to initialize a 32bit integer to
zero. This is likely to crash the application.
* CVE-2019-1786:
An out-of-bounds heap read condition may occur when scanning malformed
PDF documents as a result of improper bounds-checking.
* CVE-2019-1785:
A path-traversal write condition may occur as a result of improper
input validation when scanning RAR archives.
* CVE-2019-1798:
A use-after-free condition may occur as a result of improper error
handling when scanning nested RAR archives.
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2020-2276
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\nclamav was updated to the new major release 0.103.0. (jsc#ECO-3010,bsc#1118459)\n\nNote that libclamav was changed incompatible, if you have a 3rd party\napplication that uses libclamav, it needs to be rebuilt.\n\nUpdate to 0.103.0\n\n* clamd can now reload the signature database without blocking\n scanning. This multi-threaded database reload improvement was made\n possible thanks to a community effort.\n\n - Non-blocking database reloads are now the default behavior. Some\n systems that are more constrained on RAM may need to disable\n non-blocking reloads as it will temporarily consume two times as\n much memory. We added a new clamd config option\n ConcurrentDatabaseReload, which may be set to no.\n\n * Fix clamav-milter.service (requires clamd.service to run)\n\nUpdate to 0.102.4\n\n * CVE-2020-3350: Fix a vulnerability wherein a malicious user could\n replace a scan target's directory with a symlink to another path\n to trick clamscan, clamdscan, or clamonacc into removing or moving\n a different file (eg. a critical system file). The issue would\n affect users that use the --move or --remove options for clamscan,\n clamdscan, and clamonacc.\n * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing\n module in ClamAV 0.102.3 that could cause a Denial-of-Service\n (DoS) condition. Improper bounds checking results in an\n out-of-bounds read which could cause a crash. The previous fix for\n this CVE in 0.102.3 was incomplete. This fix correctly resolves\n the issue.\n * CVE-2020-3481: Fix a vulnerability in the EGG archive module in\n ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)\n condition. Improper error handling may result in a crash due to a\n NULL pointer dereference. This vulnerability is mitigated for\n those using the official ClamAV signature databases because the\n file type signatures in daily.cvd will not enable the EGG archive\n parser in versions affected by the vulnerability.\n\nUpdate to 0.102.3\n\n * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing\n module in ClamAV 0.102.2 that could cause a Denial-of-Service (DoS)\n condition. Improper bounds checking of an unsigned variable results\n in an out-of-bounds read which causes a crash.\n * CVE-2020-3341: Fix a vulnerability in the PDF parsing module in\n ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)\n condition. Improper size checking of a buffer used to initialize AES\n decryption routines results in an out-of-bounds read which may cause\n a crash.\n * Fix 'Attempt to allocate 0 bytes' error when parsing some PDF\n documents.\n * Fix a couple of minor memory leaks.\n * Updated libclamunrar to UnRAR 5.9.2.\n\nUpdate to 0.102.2:\n\n * CVE-2020-3123: A denial-of-service (DoS) condition may occur when\n using the optional credit card data-loss-prevention (DLP) feature.\n Improper bounds checking of an unsigned variable resulted in an\n out-of-bounds read, which causes a crash.\n * Significantly improved the scan speed of PDF files on Windows.\n * Re-applied a fix to alleviate file access issues when scanning RAR\n files in downstream projects that use libclamav where the scanning\n engine is operating in a low-privilege process. This bug was originally\n fixed in 0.101.2 and the fix was mistakenly omitted from 0.102.0.\n * Fixed an issue where freshclam failed to update if the database version\n downloaded is one version older than advertised. This situation may\n occur after a new database version is published. The issue affected\n users downloading the whole CVD database file.\n * Changed the default freshclam ReceiveTimeout setting to 0 (infinite).\n The ReceiveTimeout had caused needless database update failures for\n users with slower internet connections.\n * Correctly display the number of kilobytes (KiB) in progress bar and\n reduced the size of the progress bar to accommodate 80-character width\n terminals.\n * Fixed an issue where running freshclam manually causes a daemonized\n freshclam process to fail when it updates because the manual instance\n deletes the temporary download directory. The freshclam temporary files\n will now download to a unique directory created at the time of an update\n instead of using a hardcoded directory created/destroyed at the program\n start/exit.\n * Fix for freshclam's OnOutdatedExecute config option.\n * Fixes a memory leak in the error condition handling for the email\n parser.\n * Improved bound checking and error handling in ARJ archive parser.\n * Improved error handling in PDF parser.\n * Fix for memory leak in byte-compare signature handler.\n\n- The freshclam.service should not be started before the network is\n online (it checks for updates immediately upon service start)\n\nUpdate to 0.102.1:\n\n * CVE-2019-15961, bsc#1157763: A Denial-of-Service (DoS)\n vulnerability may occur when scanning a specially crafted email\n file as a result of excessively long scan times. The issue is\n resolved by implementing several maximums in parsing MIME\n messages and by optimizing use of memory allocation.\n * Build system fixes to build clamav-milter, to correctly link\n with libxml2 when detected, and to correctly detect fanotify\n for on-access scanning feature support.\n * Signature load time is significantly reduced by changing to a\n more efficient algorithm for loading signature patterns and\n allocating the AC trie. Patch courtesy of Alberto Wu.\n * Introduced a new configure option to statically link libjson-c\n with libclamav. Static linking with libjson is highly\n recommended to prevent crashes in applications that use\n libclamav alongside another JSON parsing library.\n * Null-dereference fix in email parser when using the\n --gen-json metadata option.\n * Fixes for Authenticode parsing and certificate signature\n (.crb database) bugs.\n\nUpdate to 0.102.0:\n\n * The On-Access Scanning feature has been migrated out of clamd\n and into a brand new utility named clamonacc. This utility is\n similar to clamdscan and clamav-milter in that it acts as a\n client to clamd. This separation from clamd means that clamd no\n longer needs to run with root privileges while scanning potentially\n malicious files. Instead, clamd may drop privileges to run under an\n account that does not have super-user. In addition to improving the\n security posture of running clamd with On-Access enabled, this\n update fixed a few outstanding defects:\n - On-Access scanning for created and moved files (Extra-Scanning)\n is fixed.\n - VirusEvent for On-Access scans is fixed.\n - With clamonacc, it is now possible to copy, move, or remove a\n file if the scan triggered an alert, just like with clamdscan.\n * The freshclam database update utility has undergone a significant\n update. This includes:\n - Added support for HTTPS.\n - Support for database mirrors hosted on ports other than 80.\n - Removal of the mirror management feature (mirrors.dat).\n - An all new libfreshclam library API.\n- created new subpackage libfreshclam2\n\nUpdate to 0.101.4:\n\n * CVE-2019-12900: An out of bounds write in the NSIS bzip2\n (bsc#1149458)\n * CVE-2019-12625: Introduce a configurable time limit to mitigate\n zip bomb vulnerability completely. Default is 2 minutes,\n configurable useing the clamscan --max-scantime and for clamd\n using the MaxScanTime config option (bsc#1144504)\n\nUpdate to version 0.101.3:\n\n * bsc#1144504: ZIP bomb causes extreme CPU spikes\n\nUpdate to version 0.101.2 (bsc#1130721)\n\n * CVE-2019-1787:\n An out-of-bounds heap read condition may occur when scanning PDF\n documents. The defect is a failure to correctly keep track of the number\n of bytes remaining in a buffer when indexing file data.\n * CVE-2019-1789:\n An out-of-bounds heap read condition may occur when scanning PE files\n (i.e. Windows EXE and DLL files) that have been packed using Aspack as a\n result of inadequate bound-checking.\n * CVE-2019-1788:\n An out-of-bounds heap write condition may occur when scanning OLE2 files\n such as Microsoft Office 97-2003 documents. The invalid write happens when\n an invalid pointer is mistakenly used to initialize a 32bit integer to\n zero. This is likely to crash the application.\n * CVE-2019-1786:\n An out-of-bounds heap read condition may occur when scanning malformed\n PDF documents as a result of improper bounds-checking.\n * CVE-2019-1785:\n A path-traversal write condition may occur as a result of improper\n input validation when scanning RAR archives.\n * CVE-2019-1798:\n A use-after-free condition may occur as a result of improper error\n handling when scanning nested RAR archives.\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2020-2276", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_2276-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2020:2276-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2020:2276-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/", }, { category: "self", summary: "SUSE Bug 1104457", url: "https://bugzilla.suse.com/1104457", }, { category: "self", summary: "SUSE Bug 1118459", url: "https://bugzilla.suse.com/1118459", }, { category: "self", summary: "SUSE Bug 1130721", url: "https://bugzilla.suse.com/1130721", }, { category: "self", summary: "SUSE Bug 1144504", url: "https://bugzilla.suse.com/1144504", }, { category: "self", summary: "SUSE Bug 1149458", url: "https://bugzilla.suse.com/1149458", }, { category: "self", summary: "SUSE Bug 1157763", url: "https://bugzilla.suse.com/1157763", }, { category: "self", summary: "SUSE CVE CVE-2019-12625 page", url: "https://www.suse.com/security/cve/CVE-2019-12625/", }, { category: "self", summary: "SUSE CVE CVE-2019-12900 page", url: "https://www.suse.com/security/cve/CVE-2019-12900/", }, { category: "self", summary: "SUSE CVE CVE-2019-15961 page", url: "https://www.suse.com/security/cve/CVE-2019-15961/", }, { category: "self", summary: "SUSE CVE CVE-2019-1785 page", url: "https://www.suse.com/security/cve/CVE-2019-1785/", }, { category: "self", summary: "SUSE CVE CVE-2019-1786 page", url: "https://www.suse.com/security/cve/CVE-2019-1786/", }, { category: "self", summary: "SUSE CVE CVE-2019-1787 page", url: "https://www.suse.com/security/cve/CVE-2019-1787/", }, { category: "self", summary: "SUSE CVE CVE-2019-1788 page", url: "https://www.suse.com/security/cve/CVE-2019-1788/", }, { category: "self", summary: "SUSE CVE CVE-2019-1789 page", url: "https://www.suse.com/security/cve/CVE-2019-1789/", }, { category: "self", summary: "SUSE CVE CVE-2019-1798 page", url: "https://www.suse.com/security/cve/CVE-2019-1798/", }, { category: "self", summary: "SUSE CVE CVE-2020-3123 page", url: "https://www.suse.com/security/cve/CVE-2020-3123/", }, { category: "self", summary: "SUSE CVE CVE-2020-3327 page", url: "https://www.suse.com/security/cve/CVE-2020-3327/", }, { category: "self", summary: "SUSE CVE CVE-2020-3341 page", url: "https://www.suse.com/security/cve/CVE-2020-3341/", }, { category: "self", summary: "SUSE CVE CVE-2020-3350 page", url: "https://www.suse.com/security/cve/CVE-2020-3350/", }, { category: "self", summary: "SUSE CVE CVE-2020-3481 page", url: "https://www.suse.com/security/cve/CVE-2020-3481/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2020-12-18T05:23:57Z", generator: { date: "2020-12-18T05:23:57Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2020:2276-1", initial_release_date: "2020-12-18T05:23:57Z", revision_history: [ { date: "2020-12-18T05:23:57Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.103.0-lp152.6.3.1.x86_64", product: { name: "clamav-0.103.0-lp152.6.3.1.x86_64", product_id: "clamav-0.103.0-lp152.6.3.1.x86_64", }, }, { category: "product_version", name: "clamav-devel-0.103.0-lp152.6.3.1.x86_64", product: { name: "clamav-devel-0.103.0-lp152.6.3.1.x86_64", product_id: "clamav-devel-0.103.0-lp152.6.3.1.x86_64", }, }, { category: "product_version", name: "libclamav9-0.103.0-lp152.6.3.1.x86_64", product: { name: "libclamav9-0.103.0-lp152.6.3.1.x86_64", product_id: "libclamav9-0.103.0-lp152.6.3.1.x86_64", }, }, { category: "product_version", name: "libfreshclam2-0.103.0-lp152.6.3.1.x86_64", product: { name: "libfreshclam2-0.103.0-lp152.6.3.1.x86_64", product_id: "libfreshclam2-0.103.0-lp152.6.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.2", product: { name: "openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.103.0-lp152.6.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", }, product_reference: "clamav-0.103.0-lp152.6.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.0-lp152.6.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", }, product_reference: "clamav-devel-0.103.0-lp152.6.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.0-lp152.6.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", }, product_reference: "libclamav9-0.103.0-lp152.6.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.0-lp152.6.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", }, product_reference: "libfreshclam2-0.103.0-lp152.6.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, ], }, vulnerabilities: [ { cve: "CVE-2019-12625", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12625", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12625", url: "https://www.suse.com/security/cve/CVE-2019-12625", }, { category: "external", summary: "SUSE Bug 1144504 for CVE-2019-12625", url: "https://bugzilla.suse.com/1144504", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-18T05:23:57Z", details: "important", }, ], title: "CVE-2019-12625", }, { cve: "CVE-2019-12900", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12900", }, ], notes: [ { category: "general", text: "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12900", url: "https://www.suse.com/security/cve/CVE-2019-12900", }, { category: "external", summary: "SUSE Bug 1139083 for CVE-2019-12900", url: "https://bugzilla.suse.com/1139083", }, { category: "external", summary: "SUSE Bug 1141513 for CVE-2019-12900", url: "https://bugzilla.suse.com/1141513", }, { category: "external", summary: "SUSE Bug 1149458 for CVE-2019-12900", url: "https://bugzilla.suse.com/1149458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-18T05:23:57Z", details: "important", }, ], title: "CVE-2019-12900", }, { cve: "CVE-2019-15961", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15961", }, ], notes: [ { category: "general", text: "A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15961", url: "https://www.suse.com/security/cve/CVE-2019-15961", }, { category: "external", summary: "SUSE Bug 1157763 for CVE-2019-15961", url: "https://bugzilla.suse.com/1157763", }, { category: "external", summary: "SUSE Bug 1180082 for CVE-2019-15961", url: "https://bugzilla.suse.com/1180082", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-18T05:23:57Z", details: "important", }, ], title: "CVE-2019-15961", }, { cve: "CVE-2019-1785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1785", }, ], notes: [ { category: "general", text: "A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1785", url: "https://www.suse.com/security/cve/CVE-2019-1785", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1785", url: "https://bugzilla.suse.com/1130721", }, { category: "external", summary: "SUSE Bug 1137508 for CVE-2019-1785", url: "https://bugzilla.suse.com/1137508", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-18T05:23:57Z", details: "low", }, ], title: "CVE-2019-1785", }, { cve: "CVE-2019-1786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1786", }, ], notes: [ { category: "general", text: "A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1786", url: "https://www.suse.com/security/cve/CVE-2019-1786", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1786", url: "https://bugzilla.suse.com/1130721", }, { category: "external", summary: "SUSE Bug 1137510 for CVE-2019-1786", url: "https://bugzilla.suse.com/1137510", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-18T05:23:57Z", details: "moderate", }, ], title: "CVE-2019-1786", }, { cve: "CVE-2019-1787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1787", }, ], notes: [ { category: "general", text: "A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1787", url: "https://www.suse.com/security/cve/CVE-2019-1787", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1787", url: "https://bugzilla.suse.com/1130721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-18T05:23:57Z", details: "important", }, ], title: "CVE-2019-1787", }, { cve: "CVE-2019-1788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1788", }, ], notes: [ { category: "general", text: "A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1788", url: "https://www.suse.com/security/cve/CVE-2019-1788", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1788", url: "https://bugzilla.suse.com/1130721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-18T05:23:57Z", details: "important", }, ], title: "CVE-2019-1788", }, { cve: "CVE-2019-1789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1789", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1789", url: "https://www.suse.com/security/cve/CVE-2019-1789", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1789", url: "https://bugzilla.suse.com/1130721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-18T05:23:57Z", details: "important", }, ], title: "CVE-2019-1789", }, { cve: "CVE-2019-1798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1798", }, ], notes: [ { category: "general", text: "A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1798", url: "https://www.suse.com/security/cve/CVE-2019-1798", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1798", url: "https://bugzilla.suse.com/1130721", }, { category: "external", summary: "SUSE Bug 1137513 for CVE-2019-1798", url: "https://bugzilla.suse.com/1137513", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-18T05:23:57Z", details: "important", }, ], title: "CVE-2019-1798", }, { cve: "CVE-2020-3123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3123", }, ], notes: [ { category: "general", text: "A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3123", url: "https://www.suse.com/security/cve/CVE-2020-3123", }, { category: "external", summary: "SUSE Bug 1162921 for CVE-2020-3123", url: "https://bugzilla.suse.com/1162921", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-18T05:23:57Z", details: "important", }, ], title: "CVE-2020-3123", }, { cve: "CVE-2020-3327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3327", }, ], notes: [ { category: "general", text: "A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3327", url: "https://www.suse.com/security/cve/CVE-2020-3327", }, { category: "external", summary: "SUSE Bug 1171980 for CVE-2020-3327", url: "https://bugzilla.suse.com/1171980", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3327", url: "https://bugzilla.suse.com/1174250", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-18T05:23:57Z", details: "important", }, ], title: "CVE-2020-3327", }, { cve: "CVE-2020-3341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3341", }, ], notes: [ { category: "general", text: "A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3341", url: "https://www.suse.com/security/cve/CVE-2020-3341", }, { category: "external", summary: "SUSE Bug 1171981 for CVE-2020-3341", url: "https://bugzilla.suse.com/1171981", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-18T05:23:57Z", details: "important", }, ], title: "CVE-2020-3341", }, { cve: "CVE-2020-3350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3350", }, ], notes: [ { category: "general", text: "A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the attacker to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3350", url: "https://www.suse.com/security/cve/CVE-2020-3350", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3350", url: "https://bugzilla.suse.com/1174250", }, { category: "external", summary: "SUSE Bug 1174255 for CVE-2020-3350", url: "https://bugzilla.suse.com/1174255", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-18T05:23:57Z", details: "moderate", }, ], title: "CVE-2020-3350", }, { cve: "CVE-2020-3481", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3481", }, ], notes: [ { category: "general", text: "A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3481", url: "https://www.suse.com/security/cve/CVE-2020-3481", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3481", url: "https://bugzilla.suse.com/1174250", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:clamav-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:clamav-devel-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libclamav9-0.103.0-lp152.6.3.1.x86_64", "openSUSE Leap 15.2:libfreshclam2-0.103.0-lp152.6.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-12-18T05:23:57Z", details: "important", }, ], title: "CVE-2020-3481", }, ], }
gsd-2019-12625
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.
Aliases
Aliases
{ GSD: { alias: "CVE-2019-12625", description: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", id: "GSD-2019-12625", references: [ "https://www.suse.com/security/cve/CVE-2019-12625.html", "https://ubuntu.com/security/CVE-2019-12625", "https://advisories.mageia.org/CVE-2019-12625.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2019-12625", ], details: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", id: "GSD-2019-12625", modified: "2023-12-13T01:23:44.020807Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2019-12625", STATE: "PUBLIC", TITLE: "ClamAV Zip Bomb Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "ClamAV", version: { version_data: [ { version_affected: "<", version_value: "0.101.3", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-400 Uncontrolled Resource Consumption", }, ], }, ], }, references: { reference_data: [ { name: "https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html", refsource: "MISC", url: "https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html", }, { name: "openSUSE-SU-2019:2595", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html", }, { name: "openSUSE-SU-2019:2597", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html", }, ], }, source: { advisory: "clamav-01014", discovery: "USER", }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "0.101.3", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2019-12625", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-404", }, ], }, ], }, references: { reference_data: [ { name: "https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html", refsource: "MISC", tags: [ "Mitigation", "Vendor Advisory", ], url: "https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html", }, { name: "openSUSE-SU-2019:2595", refsource: "SUSE", tags: [], url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html", }, { name: "openSUSE-SU-2019:2597", refsource: "SUSE", tags: [], url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, }, }, lastModifiedDate: "2019-12-01T01:15Z", publishedDate: "2019-11-05T19:15Z", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.