跳转到帖子

SUSE: CVE-2025-20128: SUSE Linux Security Advisory

recommended_posts

发布于
  • Members

SUSE: CVE-2025-20128: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
01/22/2025
Created
02/05/2025
Added
02/05/2025
Modified
02/05/2025

Description

A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the . Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Solution(s)

  • suse-upgrade-clamav
  • suse-upgrade-clamav-devel
  • suse-upgrade-clamav-docs-html
  • suse-upgrade-clamav-milter
  • suse-upgrade-libclamav12
  • suse-upgrade-libclammspack0
  • suse-upgrade-libfreshclam3

References

  • https://attackerkb.com/topics/cve-2025-20128
  • CVE - 2025-20128
  • 查看数 703
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…