gsd-2023-20197
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources.
For a description of this vulnerability, see the ClamAV blog .
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-20197", "id": "GSD-2023-20197" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-20197" ], "details": "A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources.\r\n\r For a description of this vulnerability, see the ClamAV blog .", "id": "GSD-2023-20197", "modified": "2023-12-13T01:20:28.011639Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2023-20197", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Secure Endpoint", "version": { "version_data": [ { "version_affected": "=", "version_value": "6.0.9" }, { "version_affected": "=", "version_value": "6.0.7" }, { "version_affected": "=", "version_value": "6.1.5" }, { "version_affected": "=", "version_value": "6.1.7" }, { "version_affected": "=", "version_value": "6.1.9" }, { "version_affected": "=", "version_value": "6.2.1" }, { "version_affected": "=", "version_value": "6.2.5" }, { "version_affected": "=", "version_value": "6.2.19" }, { "version_affected": "=", "version_value": "6.2.9" }, { "version_affected": "=", "version_value": "6.3.5" }, { "version_affected": "=", "version_value": "6.3.1" }, { "version_affected": "=", "version_value": "6.3.7" }, { "version_affected": "=", "version_value": "6.3.3" }, { "version_affected": "=", "version_value": "7.0.5" }, { "version_affected": "=", "version_value": "7.1.1" }, { "version_affected": "=", "version_value": "7.1.5" }, { "version_affected": "=", "version_value": "1.12.1" }, { "version_affected": "=", "version_value": "1.12.2" }, { "version_affected": "=", "version_value": "1.12.5" }, { "version_affected": "=", "version_value": "1.12.0" }, { "version_affected": "=", "version_value": "1.12.6" }, { "version_affected": "=", "version_value": "1.12.3" }, { "version_affected": "=", "version_value": "1.12.7" }, { "version_affected": "=", "version_value": "1.12.4" }, { "version_affected": "=", "version_value": "1.13.0" }, { "version_affected": "=", "version_value": "1.13.1" }, { "version_affected": "=", "version_value": "1.13.2" }, { "version_affected": "=", "version_value": "1.11.0" }, { "version_affected": "=", "version_value": "1.10.2" }, { "version_affected": "=", "version_value": "1.10.1" }, { "version_affected": "=", "version_value": "1.10.0" }, { "version_affected": "=", "version_value": "1.14.0" }, { "version_affected": "=", "version_value": "1.6.0" }, { "version_affected": "=", "version_value": "1.9.0" }, { "version_affected": "=", "version_value": "1.9.1" }, { "version_affected": "=", "version_value": "1.8.1" }, { "version_affected": "=", "version_value": "1.8.0" }, { "version_affected": "=", "version_value": "1.8.4" }, { "version_affected": "=", "version_value": "1.7.0" }, { "version_affected": "=", "version_value": "7.2.13" }, { "version_affected": "=", "version_value": "7.2.7" }, { "version_affected": "=", "version_value": "7.2.3" }, { "version_affected": "=", "version_value": "7.2.11" }, { "version_affected": "=", "version_value": "7.2.5" }, { "version_affected": "=", "version_value": "7.3.3" }, { "version_affected": "=", "version_value": "7.3.5" }, { "version_affected": "=", "version_value": "8.1.5" } ] } }, { "product_name": "Cisco Secure Endpoint Private Cloud Console", "version": { "version_data": [ { "version_affected": "=", "version_value": "N/A" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources.\r\n\r For a description of this vulnerability, see the ClamAV blog ." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability that is described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-835", "lang": "eng", "value": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-rNwNEEee", "refsource": "MISC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-rNwNEEee" } ] }, "source": { "advisory": "cisco-sa-clamav-rNwNEEee", "defects": [ "CSCwf39307", "CSCwf39308", "CSCwf39309", "CSCwf39310" ], "discovery": "EXTERNAL" } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*", "matchCriteriaId": "FD7E5997-8229-4DE1-A1F7-0C3A2A65C71A", "versionEndExcluding": "1.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*", "matchCriteriaId": "AC26FA0D-54D5-4600-A2F1-D715236CDCF2", "versionEndExcluding": "1.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*", "matchCriteriaId": "973542E7-2835-46C0-B99D-BA294BBC5563", "versionEndExcluding": "7.5.13.21586", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E7C7440F-C62E-43F4-943E-161D9AB24C22", "versionEndExcluding": "8.1.7.21585", "versionStartIncluding": "8.0.1.21160", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*", "matchCriteriaId": "D10B7EE9-96DE-4761-834A-FA5C31326A23", "versionEndExcluding": "3.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources.\r\n\r For a description of this vulnerability, see the ClamAV blog ." } ], "id": "CVE-2023-20197", "lastModified": "2024-01-25T17:15:34.700", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" } ] }, "published": "2023-08-16T22:15:10.510", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-rNwNEEee" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "ykramarz@cisco.com", "type": "Secondary" } ] } } } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.