SB2025061845 - Cisco Secure Endpoint Connectors update for ClamAV
Published: June 18, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: N/A)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in Xz decompression module. A remote attacker can pass a specially crafted archive to the application and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
2) Out-of-bounds read (CVE-ID: CVE-2025-20234)
The vulnerability allows a remote attacker to gain access to perform a denial of service attack.
The vulnerability exists due to a boundary condition when handling UDF files. A remote attacker can pass a specially crafted UDF file to the application, trigger an out-of-bounds read error and read contents of memory on the system or perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-udf-hmwd9nDy"
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-udf-hmwd9nDy</a></p><p><a
- https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html"
- https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html</a></p><p>
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwo45640</p><p><br></p>