Upstream information

CVE-2017-12380 at MITRE

Description

ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.8
Vector AV:N/AC:L/Au:N/C:N/I:N/A:C
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete
CVSS v3 Scores
  SUSE
Base Score 7.5
Vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Access Vector Network
Access Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
SUSE Bugzilla entry: 1077732 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 12 SP2
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-DESKTOP-12-SP2-2018-176
SUSE Linux Enterprise Desktop 12 SP3
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-DESKTOP-12-SP3-2018-176
SUSE Linux Enterprise Module for Basesystem 15
  • clamav >= 0.100.0-1.17
  • clamav-devel >= 0.100.0-1.17
  • libclamav7 >= 0.100.0-1.17
  • libclammspack0 >= 0.100.0-1.17
Patchnames:
SUSE Linux Enterprise Module for Basesystem 15 GA clamav
SUSE Linux Enterprise Point of Sale 11 SP3
  • clamav >= 0.99.3-0.20.3.2
Patchnames:
sleposp3-clamav-13445
SUSE Linux Enterprise Server 11 SP3-LTSS
  • clamav >= 0.99.3-0.20.3.2
Patchnames:
slessp3-clamav-13445
SUSE Linux Enterprise Server 11 SP4
  • clamav >= 0.99.3-0.20.3.2
Patchnames:
slessp4-clamav-13445
SUSE Linux Enterprise Server 12 SP1-LTSS
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-SP1-2018-176
SUSE Linux Enterprise Server 12 SP2
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-SP2-2018-176
SUSE Linux Enterprise Server 12 SP3
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-SP3-2018-176
SUSE Linux Enterprise Server 12-LTSS
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-2018-176
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-RPI-12-SP2-2018-176
SUSE Linux Enterprise Server for SAP Applications 11 SP3-LTSS
  • clamav >= 0.99.3-0.20.3.2
Patchnames:
slessp3-clamav-13445
SUSE Linux Enterprise Server for SAP Applications 11 SP4
  • clamav >= 0.99.3-0.20.3.2
Patchnames:
slessp4-clamav-13445
SUSE Linux Enterprise Server for SAP Applications 12
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SAP-12-2018-176
SUSE Linux Enterprise Server for SAP Applications 12 SP1
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SAP-12-SP1-2018-176
SUSE Linux Enterprise Server for SAP Applications 12 SP1-LTSS
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-SP1-2018-176
SUSE Linux Enterprise Server for SAP Applications 12 SP2
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-SP2-2018-176
SUSE Linux Enterprise Server for SAP Applications 12 SP3
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-SP3-2018-176
SUSE Linux Enterprise Server for SAP Applications 12-LTSS
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-SLE-SERVER-12-2018-176
SUSE OpenStack Cloud 6
  • clamav >= 0.99.3-33.5.1
Patchnames:
SUSE-OpenStack-Cloud-6-2018-176
openSUSE Leap 42.3
  • clamav >= 0.99.3-20.1
  • clamav-debuginfo >= 0.99.3-20.1
  • clamav-debugsource >= 0.99.3-20.1
Patchnames:
openSUSE-2018-102


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
SUSE Linux Enterprise Desktop 12 SP2 clamav Released
SUSE Linux Enterprise Desktop 12 SP3 clamav Released
SUSE Linux Enterprise Server 11 SP3 LTSS clamav Released
SUSE Linux Enterprise Server 11 SP4 clamav Released
SUSE Linux Enterprise Server 12 GA LTSS clamav Released
SUSE Linux Enterprise Server 12 SP1 LTSS clamav Released
SUSE Linux Enterprise Server 12 SP2 clamav Released
SUSE Linux Enterprise Server 12 SP3 clamav Released