Upstream information

CVE-2017-12379 at MITRE

Description

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in the message parsing function on an affected system. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a messageAddArgument (in message.c) buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition or execute arbitrary code on an affected device.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 10
Vector AV:N/AC:L/Au:N/C:C/I:C/A:C
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
CVSS v3 Scores
  SUSE
Base Score 7.3
Vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Access Vector Network
Access Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact Low
Integrity Impact Low
Availability Impact Low
SUSE Bugzilla entry: 1077732 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 12 SP2
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-DESKTOP-12-SP2-2018-176
SUSE Linux Enterprise Desktop 12 SP3
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-DESKTOP-12-SP3-2018-176
SUSE Linux Enterprise Module for Basesystem 15
  • clamav >= 0.100.0-1.17
  • clamav-devel >= 0.100.0-1.17
  • libclamav7 >= 0.100.0-1.17
  • libclammspack0 >= 0.100.0-1.17
Patchnames:
SUSE Linux Enterprise Module for Basesystem 15 GA clamav
SUSE Linux Enterprise Point of Sale 11 SP3
  • clamav >= 0.99.3-0.20.3.2
Patchnames:
sleposp3-clamav-13445
SUSE Linux Enterprise Server 11 SP3-LTSS
  • clamav >= 0.99.3-0.20.3.2
Patchnames:
slessp3-clamav-13445
SUSE Linux Enterprise Server 11 SP4
  • clamav >= 0.99.3-0.20.3.2
Patchnames:
slessp4-clamav-13445
SUSE Linux Enterprise Server 12 SP1-LTSS
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-SP1-2018-176
SUSE Linux Enterprise Server 12 SP2
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-SP2-2018-176
SUSE Linux Enterprise Server 12 SP3
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-SP3-2018-176
SUSE Linux Enterprise Server 12-LTSS
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-2018-176
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-RPI-12-SP2-2018-176
SUSE Linux Enterprise Server for SAP Applications 11 SP3-LTSS
  • clamav >= 0.99.3-0.20.3.2
Patchnames:
slessp3-clamav-13445
SUSE Linux Enterprise Server for SAP Applications 11 SP4
  • clamav >= 0.99.3-0.20.3.2
Patchnames:
slessp4-clamav-13445
SUSE Linux Enterprise Server for SAP Applications 12
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SAP-12-2018-176
SUSE Linux Enterprise Server for SAP Applications 12 SP1
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SAP-12-SP1-2018-176
SUSE Linux Enterprise Server for SAP Applications 12 SP1-LTSS
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-SP1-2018-176
SUSE Linux Enterprise Server for SAP Applications 12 SP2
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-SP2-2018-176
SUSE Linux Enterprise Server for SAP Applications 12 SP3
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-SP3-2018-176
SUSE Linux Enterprise Server for SAP Applications 12-LTSS
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-2018-176
SUSE OpenStack Cloud 6
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-OpenStack-Cloud-6-2018-176
openSUSE Leap 42.3
  • clamav >= 0.99.3-20.1
  • clamav-debuginfo >= 0.99.3-20.1
  • clamav-debugsource >= 0.99.3-20.1
Patchnames:
openSUSE-2018-102


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
SUSE Linux Enterprise Desktop 12 SP2 clamav Released
SUSE Linux Enterprise Desktop 12 SP3 clamav Released
SUSE Linux Enterprise Server 11 SP3 LTSS clamav Released
SUSE Linux Enterprise Server 11 SP4 clamav Released
SUSE Linux Enterprise Server 12 GA LTSS clamav Released
SUSE Linux Enterprise Server 12 SP1 LTSS clamav Released
SUSE Linux Enterprise Server 12 SP2 clamav Released
SUSE Linux Enterprise Server 12 SP3 clamav Released