CVE-2021-1405
Publication date 8 April 2021
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A vulnerability in the email parsing module in Clam AntiVirus (ClamAV) Software version 0.103.1 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper variable initialization that may result in an NULL pointer read. An attacker could exploit this vulnerability by sending a crafted email to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
Status
Package | Ubuntu Release | Status |
---|---|---|
clamav | ||
20.04 LTS focal |
Fixed 0.103.2+dfsg-0ubuntu0.20.04.1
|
|
18.04 LTS bionic |
Fixed 0.103.2+dfsg-0ubuntu0.18.04.1
|
|
16.04 LTS xenial |
Fixed 0.103.2+dfsg-0ubuntu0.16.04.1
|
|
14.04 LTS trusty |
Fixed 0.103.2+dfsg-0ubuntu0.14.04.1+esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProSeverity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4918-1
- ClamAV vulnerabilities
- 19 April 2021
- USN-4918-2
- ClamAV vulnerabilities
- 20 April 2021