CVE-2023-20052

On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed: A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*
cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*
cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*
cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*
cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:1.0.0:-:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:1.0.0:rc:*:*:*:*:*:*
cpe:2.3:a:clamav:clamav:1.0.0:rc2:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*
cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*
cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*
cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*

History

25 Jan 2024, 17:15

Type Values Removed Values Added
CWE CWE-611
References
  • {'url': 'https://security.gentoo.org/glsa/202310-01', 'source': 'ykramarz@cisco.com'}

01 Oct 2023, 11:15

Type Values Removed Values Added
References
  • (MISC) https://security.gentoo.org/glsa/202310-01 -
Summary On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed: A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process. On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed: A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process.

19 Jul 2023, 00:56

Type Values Removed Values Added
CPE cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*
First Time Stormshield stormshield Network Security
Stormshield

13 Mar 2023, 13:52

Type Values Removed Values Added
First Time Cisco
Cisco secure Endpoint Private Cloud
Cisco secure Endpoint
Clamav
Clamav clamav
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References (MISC) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-xxe-TcSZduhN - (MISC) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-xxe-TcSZduhN - Vendor Advisory
CWE CWE-776
CPE cpe:2.3:a:clamav:clamav:1.0.0:rc:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*
cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*
cpe:2.3:a:clamav:clamav:1.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*
cpe:2.3:a:clamav:clamav:1.0.0:-:*:*:*:*:*:*

01 Mar 2023, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-01 08:15

Updated : 2024-01-25 17:15


NVD link : CVE-2023-20052

Mitre link : CVE-2023-20052

CVE.ORG link : CVE-2023-20052


JSON object : View

Products Affected

stormshield

  • stormshield_network_security

cisco

  • secure_endpoint_private_cloud
  • secure_endpoint

clamav

  • clamav
CWE
CWE-776

Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

CWE-611

Improper Restriction of XML External Entity Reference