A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.
For a description of this vulnerability, see the .
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
References
Configurations
No configuration.
History
18 Feb 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
Summary |
|
22 Jan 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-22 17:15
Updated : 2025-02-18 20:15
NVD link : CVE-2025-20128
Mitre link : CVE-2025-20128
CVE.ORG link : CVE-2025-20128
JSON object : View
Products Affected
No product.
CWE
CWE-122
Heap-based Buffer Overflow