Published On: Feb 20, 2023 12:33
Advisory No:
Source:
Software Affected:
Advisory No: TZCERT/SA/2023/02/17
Date of First Release: 17th February 2023
Source: CISCO
Software Affected: ClamAV: 0.103.8,0.105.2 and 1.0.1
Overview:
Cisco has rolled out security updates to address a critical flaw reported in the ClamAV open source antivirus engine that could lead to remote code execution on susceptible devices. This vulnerability could allow attackers to take control of a affected system.
Description:
The vulnerability, tracked as CVE-2023-20032 (CVSS score: 9.8), is caused by a buffer overflow in the HFS+ file parser. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device.
A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.
This vulnerability is vulnerability affects the following products:-
Impact:
Successful exploitation of this vulnerability may allow the attacker to control of the affected system.
Solution:
CISCO has released a patch for this vulnerability. Users and administrators are encouraged to apply necessary updates.
References:
A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.