Clamav Cisco Clamav

Do you want an email whenever new security vulnerabilities are reported in Cisco Clamav?

Recent Cisco Clamav Security Advisories

Advisory Title Published
2024-02-08 ClamAV OLE2 File Format Parsing Denial of Service Vulnerability February 8, 2024
2023-08-16 ClamAV AutoIt Module Denial of Service Vulnerability August 16, 2023
2023-08-16 ClamAV HFS+ File Scanning Infinite Loop Denial of Service Vulnerability August 16, 2023
2023-02-15 ClamAV HFS+ Partition Scanning Buffer Overflow Vulnerability Affecting Cisco Products: February 2023 February 15, 2023
2023-02-15 ClamAV DMG File Parsing XML Entity Expansion Vulnerability Affecting Cisco Products: February 2023 February 15, 2023
2022-05-04 ClamAV HTML Scanning Memory Leak Vulnerability Affecting Cisco Products: April 2022 May 4, 2022
2022-05-04 ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: April 2022 May 4, 2022
2022-05-04 ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022 May 4, 2022
2022-05-04 ClamAV TIFF File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022 May 4, 2022
2021-04-07 Cisco Advanced Malware Protection for Endpoints Windows Connector, ClamAV for Windows, and Immunet DLL Hijacking Vulnerability April 7, 2021

By the Year

In 2024 there have been 0 vulnerabilities in Cisco Clamav . Clamav did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 1 7.80
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Clamav vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Cisco Clamav Security Vulnerabilities

A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could

CVE-2021-1386 7.8 - High - April 08, 2021

A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system. To exploit this vulnerability, the attacker would need valid credentials on the system. The vulnerability is due to insufficient validation of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on an affected system. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges.

DLL preloading

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Cisco Immunet or by Cisco? Click the Watch button to subscribe.

Cisco
Vendor

Cisco Clamav
Product

subscribe