Amazon Linux AMI update for clamav



Risk Critical
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2023-20032
CVE-2023-20052
CWE-ID CWE-122
CWE-611
Exploitation vector Network
Public exploit Public exploit code for vulnerability #2 is available.
Vulnerable software
Amazon Linux AMI
Operating systems & Components / Operating system

clamav
Operating systems & Components / Operating system package or component

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Heap-based buffer overflow

EUVDB-ID: #VU72297

Risk: Critical

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Red]

CVE-ID: CVE-2023-20032

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the HFS+ partition file parser. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected packages:

aarch64:
    clamd-0.103.8-1.amzn2023.0.1.aarch64
    clamav-lib-debuginfo-0.103.8-1.amzn2023.0.1.aarch64
    clamav-milter-debuginfo-0.103.8-1.amzn2023.0.1.aarch64
    clamav-update-debuginfo-0.103.8-1.amzn2023.0.1.aarch64
    clamav-debuginfo-0.103.8-1.amzn2023.0.1.aarch64
    clamav-lib-0.103.8-1.amzn2023.0.1.aarch64
    clamav-devel-0.103.8-1.amzn2023.0.1.aarch64
    clamav-update-0.103.8-1.amzn2023.0.1.aarch64
    clamd-debuginfo-0.103.8-1.amzn2023.0.1.aarch64
    clamav-debugsource-0.103.8-1.amzn2023.0.1.aarch64
    clamav-milter-0.103.8-1.amzn2023.0.1.aarch64
    clamav-0.103.8-1.amzn2023.0.1.aarch64

noarch:
    clamav-data-0.103.8-1.amzn2023.0.1.noarch
    clamav-filesystem-0.103.8-1.amzn2023.0.1.noarch
    clamav-doc-0.103.8-1.amzn2023.0.1.noarch

src:
    clamav-0.103.8-1.amzn2023.0.1.src

x86_64:
    clamav-devel-0.103.8-1.amzn2023.0.1.x86_64
    clamd-0.103.8-1.amzn2023.0.1.x86_64
    clamav-update-debuginfo-0.103.8-1.amzn2023.0.1.x86_64
    clamd-debuginfo-0.103.8-1.amzn2023.0.1.x86_64
    clamav-milter-0.103.8-1.amzn2023.0.1.x86_64
    clamav-milter-debuginfo-0.103.8-1.amzn2023.0.1.x86_64
    clamav-0.103.8-1.amzn2023.0.1.x86_64
    clamav-lib-debuginfo-0.103.8-1.amzn2023.0.1.x86_64
    clamav-update-0.103.8-1.amzn2023.0.1.x86_64
    clamav-lib-0.103.8-1.amzn2023.0.1.x86_64
    clamav-debuginfo-0.103.8-1.amzn2023.0.1.x86_64
    clamav-debugsource-0.103.8-1.amzn2023.0.1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

clamav: before 0.103.8-1.52

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-112.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) XML External Entity injection

EUVDB-ID: #VU72298

Risk: Medium

CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2023-20052

CWE-ID: CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to enabling XML entity substitution. A remote attacker can pass a specially crafted XML code to the antivirus and view bytes from any file that may be read by the ClamAV scanning process.


Mitigation

Update the affected packages:

aarch64:
    clamd-0.103.8-1.amzn2023.0.1.aarch64
    clamav-lib-debuginfo-0.103.8-1.amzn2023.0.1.aarch64
    clamav-milter-debuginfo-0.103.8-1.amzn2023.0.1.aarch64
    clamav-update-debuginfo-0.103.8-1.amzn2023.0.1.aarch64
    clamav-debuginfo-0.103.8-1.amzn2023.0.1.aarch64
    clamav-lib-0.103.8-1.amzn2023.0.1.aarch64
    clamav-devel-0.103.8-1.amzn2023.0.1.aarch64
    clamav-update-0.103.8-1.amzn2023.0.1.aarch64
    clamd-debuginfo-0.103.8-1.amzn2023.0.1.aarch64
    clamav-debugsource-0.103.8-1.amzn2023.0.1.aarch64
    clamav-milter-0.103.8-1.amzn2023.0.1.aarch64
    clamav-0.103.8-1.amzn2023.0.1.aarch64

noarch:
    clamav-data-0.103.8-1.amzn2023.0.1.noarch
    clamav-filesystem-0.103.8-1.amzn2023.0.1.noarch
    clamav-doc-0.103.8-1.amzn2023.0.1.noarch

src:
    clamav-0.103.8-1.amzn2023.0.1.src

x86_64:
    clamav-devel-0.103.8-1.amzn2023.0.1.x86_64
    clamd-0.103.8-1.amzn2023.0.1.x86_64
    clamav-update-debuginfo-0.103.8-1.amzn2023.0.1.x86_64
    clamd-debuginfo-0.103.8-1.amzn2023.0.1.x86_64
    clamav-milter-0.103.8-1.amzn2023.0.1.x86_64
    clamav-milter-debuginfo-0.103.8-1.amzn2023.0.1.x86_64
    clamav-0.103.8-1.amzn2023.0.1.x86_64
    clamav-lib-debuginfo-0.103.8-1.amzn2023.0.1.x86_64
    clamav-update-0.103.8-1.amzn2023.0.1.x86_64
    clamav-lib-0.103.8-1.amzn2023.0.1.x86_64
    clamav-debuginfo-0.103.8-1.amzn2023.0.1.x86_64
    clamav-debugsource-0.103.8-1.amzn2023.0.1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

clamav: before 0.103.8-1.52

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-112.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###