Vulnerability Details : CVE-2013-2020
Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read.
Vulnerability category: Denial of service
Products affected by CVE-2013-2020
- cpe:2.3:o:suse:linux_enterprise_server:11.0:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90:rc3:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.3_p1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.2_p0:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90:rc1.1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.1_p0:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90:rc2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.3_p0:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.92_p0:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91:rc2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.91.2_p0:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.94.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.93.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.94:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.93.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.92.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.93:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.92:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.93.3:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.94.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95:src1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95:src2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95:rc2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96:rc1:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.95.3:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96:rc2:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96.3:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.97:rc:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.97:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.96.5:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.97.1:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.97.2:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.97.4:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.97.3:*:*:*:*:*:*:*
- cpe:2.3:a:clamav:clamav:0.97.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-2020
10.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-2020
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2013-2020
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-2020
-
http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html
openSUSE-SU-2013:0881-1: moderate: Update for clamav to version 0.97.8.
-
http://www.ubuntu.com/usn/USN-1816-1
USN-1816-1: ClamAV vulnerabilities | Ubuntu security notices
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html
[SECURITY] Fedora 18 Update: clamav-0.97.8-2.fc18
-
http://support.apple.com/kb/HT5880
About the security content of OS X Mountain Lion v10.8.5 and Security Update 2013-004 - Apple Support
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html
[SECURITY] Fedora 18 Update: clamav-0.97.8-1.fc18
-
http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html
openSUSE-SU-2013:0883-1: moderate: Update for clamav to version 0.97.8.
-
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html
[security-announce] SUSE-SU-2014:1571-1: important: Security update for
-
https://bugzilla.clamav.net/show_bug.cgi?id=7055
Bug 7055 – G_Report 1678
-
http://www.securityfocus.com/bid/59434
ClamAV Remote Code Execution And Denial of Service Vulnerabilities
-
http://support.apple.com/kb/HT5892
About the security content of OS X Server v2.2.2 - Apple Support
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html
[SECURITY] Fedora 19 Update: clamav-0.97.8-2.fc19
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html
[SECURITY] Fedora 17 Update: clamav-0.97.8-2.fc17
-
http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
Apple - Lists.apple.com
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:159
mandriva.com
-
http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
Apple - Lists.apple.com
-
https://github.com/vrtadmin/clamav-devel/commit/270e368b99e93aa5447d46c797c92c3f9f39f375
libclamav: bb #7055 · Cisco-Talos/clamav-devel@270e368 · GitHub
-
http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html
ClamAV® blog: ClamAV 0.97.8 has been released!Patch
-
http://www.openwall.com/lists/oss-security/2013/04/29/20
oss-security - Re: Multiple potential security issues fixed in ClamAV 0.97.8 - any further details?
-
http://www.openwall.com/lists/oss-security/2013/04/25/2
oss-security - Re: Multiple potential security issues fixed in ClamAV 0.97.8 - any further details?
Jump to