HTTP: ClamAV initialize_encryption_key Out-Of-Bounds Read

This signature detects attempts to exploit a known vulnerability against ClamAV initialize_encryption_key. A successful attack can result in a denial-of-service condition.

Extended Description

A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources. For a description of this vulnerability, see the ClamAV blog .

Affected Products

Fedoraproject fedora

References

CVE: CVE-2024-20290

Short Name
HTTP:STC:CLAMAV-EK-OOB
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2024-20290 ClamAV Out-Of-Bounds Read initialize_encryption_key
Release Date
04/04/2024
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3697
False Positive
Unknown
Vendors

Fedoraproject

Cisco

Found a potential security threat?