A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources.
For a description of this vulnerability, see the ClamAV blog .
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.22.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.22.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.5.13.21586"
}
]
},
{
"events": [
{
"introduced": "8.0.1.21160"
},
{
"fixed": "8.1.7.21585"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "38"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-20197.json"