
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2020-3123) was discovered in the Data-Loss-Prevention (DLP) module of Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0. The vulnerability was disclosed on February 5, 2020, affecting the optional DLP feature in ClamAV. This security issue could allow an unauthenticated, remote attacker to cause a denial of service condition on affected devices (ClamAV Blog, CVE Mitre).
The vulnerability stems from an out-of-bounds read condition affecting users who have enabled the optional DLP feature. The issue occurs due to improper bounds checking of an unsigned variable, which results in an out-of-bounds read operation. The vulnerability has been assigned a CVSS 3.1 Base Score of 7.5 (High), with the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (Ubuntu Security).
When successfully exploited, this vulnerability can cause the ClamAV scanning process to crash, resulting in a denial of service condition. The impact is limited to availability, with no direct effect on confidentiality or integrity of the system (CVE Mitre).
The vulnerability was patched in ClamAV version 0.102.2. Users are advised to upgrade to this version or later to address the security issue. The fix was released on February 5, 2020, and has been backported to various Linux distributions including Ubuntu, Debian, and Gentoo (ClamAV Blog, Gentoo Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."