A vulnerability in the HTML parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerability is due to an issue in the C to Rust foreign function interface. An attacker could exploit this vulnerability by submitting a crafted file containing HTML content to be scanned by ClamAV on an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software.
                
            References
                    | Link | Resource | 
|---|---|
| https://blog.clamav.net/2024/04/clamav-131-123-106-patch-versions.html | Vendor Advisory | 
| https://blog.clamav.net/2024/04/clamav-131-123-106-patch-versions.html | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    23 Jul 2025, 15:08
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Clamav clamav Clamav | |
| References | () https://blog.clamav.net/2024/04/clamav-131-123-106-patch-versions.html - Vendor Advisory | |
| CPE | cpe:2.3:a:clamav:clamav:1.3.0:rc:*:*:*:*:*:* cpe:2.3:a:clamav:clamav:1.3.0:rc2:*:*:*:*:*:* cpe:2.3:a:clamav:clamav:1.3.0:-:*:*:*:*:*:* | 
Information
                Published : 2024-04-18 20:15
Updated : 2025-07-23 15:08
NVD link : CVE-2024-20380
Mitre link : CVE-2024-20380
CVE.ORG link : CVE-2024-20380
JSON object : View
Products Affected
                clamav
- clamav
CWE
                
                    
                        
                        CWE-475
                        
            Undefined Behavior for Input to API
