A vulnerability in the HTML parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerability is due to an issue in the C to Rust foreign function interface. An attacker could exploit this vulnerability by submitting a crafted file containing HTML content to be scanned by ClamAV on an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software.
References
Link | Resource |
---|---|
https://blog.clamav.net/2024/04/clamav-131-123-106-patch-versions.html | Vendor Advisory |
https://blog.clamav.net/2024/04/clamav-131-123-106-patch-versions.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
23 Jul 2025, 15:08
Type | Values Removed | Values Added |
---|---|---|
First Time |
Clamav clamav
Clamav |
|
References | () https://blog.clamav.net/2024/04/clamav-131-123-106-patch-versions.html - Vendor Advisory | |
CPE | cpe:2.3:a:clamav:clamav:1.3.0:rc:*:*:*:*:*:* cpe:2.3:a:clamav:clamav:1.3.0:rc2:*:*:*:*:*:* cpe:2.3:a:clamav:clamav:1.3.0:-:*:*:*:*:*:* |
Information
Published : 2024-04-18 20:15
Updated : 2025-07-23 15:08
NVD link : CVE-2024-20380
Mitre link : CVE-2024-20380
CVE.ORG link : CVE-2024-20380
JSON object : View
Products Affected
clamav
- clamav
CWE
CWE-475
Undefined Behavior for Input to API