iTnews Asia
  • Home
  • News
  • Security

ClamAV vulnerability hits Cisco security software

ClamAV vulnerability hits Cisco security software

Remote code execution bug patched.

By Richard Chirgwin on Feb 20, 2023 10:50AM

Cisco has revealed that a vulnerability discovered in the open source ClamAV anti-virus scanning engine affects some of its security products.

The bug, CVE-2023-20032, was patched on Wednesday by ClamAV’s maintainers.

“A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code," ClamAV’s advisory stated.

Cisco’s advisory elaborated by stating that “this vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write."

"An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device," Cisco said.

"A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.”

Cisco uses ClamAV in its Secure Endpoint (formerly Advanced Malware Protection for Endpoints) for Windows, MacOS, and Windows; its Secure Endpoint Private Cloud; and its Secure Web Appliance products.

Fixes have been published for all products.

The networking giant also announced that its Nexus Dashboard has been patched to fix a denial-of-service vulnerability, CVE-2023-20014, in its DNS request handling.

“An attacker could exploit this vulnerability by sending a continuous stream of DNS requests to an affected device," Cisco said.

"A successful exploit could allow the attacker to cause the coredns service to stop working or cause the device to reload, resulting in a DoS condition.” 

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
cisco clamav security

Related Articles

  • Your organisation’s physical security can be a gateway for cybercriminals
  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Your organisation’s physical security can be a gateway for cybercriminals

Your organisation’s physical security can be a gateway for cybercriminals

Malaysia's Maxis Berhad investigates claims on alleged data breach

Malaysia's Maxis Berhad investigates claims on alleged data breach

DBS plans US$58 million investment to improve technology resilience

DBS plans US$58 million investment to improve technology resilience

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.