diff --git a/data/anchore/2024/CVE-2024-20290.json b/data/anchore/2024/CVE-2024-20290.json index c99aaf7a..8c81dfd6 100644 --- a/data/anchore/2024/CVE-2024-20290.json +++ b/data/anchore/2024/CVE-2024-20290.json @@ -2,6 +2,7 @@ "additionalMetadata": { "cna": "cisco", "cveId": "CVE-2024-20290", + "needsReview": true, "reason": "Added CPE configurations for clamav as those were not yet present in the NVD record.", "references": [ "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FXZYVDNV66RNMNVJOHAJAYRZV4U64CQ/", @@ -18,6 +19,7 @@ "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*" ], "product": "ClamAV", + "repo": "https://github.com/cisco-talos/clamav", "vendor": "Cisco", "versions": [ { @@ -73,6 +75,50 @@ "versionType": "custom" } ] + }, + { + "collectionURL": "https://www.clamav.net/downloads", + "packageName": "clamav", + "packageType": "deb", + "product": "ClamAV", + "repo": "https://github.com/cisco-talos/clamav", + "vendor": "Cisco", + "versions": [ + { + "lessThan": "1.0.5", + "status": "affected", + "version": "1.0.0", + "versionType": "deb" + }, + { + "lessThan": "1.2.2", + "status": "affected", + "version": "1.1", + "versionType": "deb" + } + ] + }, + { + "collectionURL": "https://www.clamav.net/downloads", + "packageName": "clamav", + "packageType": "rpm", + "product": "ClamAV", + "repo": "https://github.com/cisco-talos/clamav", + "vendor": "Cisco", + "versions": [ + { + "lessThan": "1.0.5", + "status": "affected", + "version": "1.0.0", + "versionType": "rpm" + }, + { + "lessThan": "1.2.2", + "status": "affected", + "version": "1.1", + "versionType": "rpm" + } + ] } ], "providerMetadata": { diff --git a/data/anchore/2024/CVE-2024-20328.json b/data/anchore/2024/CVE-2024-20328.json index 96b17db6..638fecad 100644 --- a/data/anchore/2024/CVE-2024-20328.json +++ b/data/anchore/2024/CVE-2024-20328.json @@ -2,6 +2,7 @@ "additionalMetadata": { "cna": "cisco", "cveId": "CVE-2024-20328", + "needsReview": true, "reason": "Added CPE configurations because not yet analyzed by NVD.", "references": [ "https://blog.clamav.net/2023/11/clamav-130-122-105-released.html" @@ -16,6 +17,7 @@ "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*" ], "product": "ClamAV", + "repo": "https://github.com/cisco-talos/clamav", "vendor": "Cisco", "versions": [ { @@ -31,6 +33,50 @@ "versionType": "semver" } ] + }, + { + "collectionURL": "https://www.clamav.net/downloads", + "packageName": "clamav", + "packageType": "deb", + "product": "ClamAV", + "repo": "https://github.com/cisco-talos/clamav", + "vendor": "Cisco", + "versions": [ + { + "lessThan": "1.0.5", + "status": "affected", + "version": "0", + "versionType": "deb" + }, + { + "lessThan": "1.2.2", + "status": "affected", + "version": "1.2.0", + "versionType": "deb" + } + ] + }, + { + "collectionURL": "https://www.clamav.net/downloads", + "packageName": "clamav", + "packageType": "rpm", + "product": "ClamAV", + "repo": "https://github.com/cisco-talos/clamav", + "vendor": "Cisco", + "versions": [ + { + "lessThan": "1.0.5", + "status": "affected", + "version": "0", + "versionType": "rpm" + }, + { + "lessThan": "1.2.2", + "status": "affected", + "version": "1.2.0", + "versionType": "rpm" + } + ] } ], "providerMetadata": { diff --git a/data/anchore/2024/CVE-2024-20380.json b/data/anchore/2024/CVE-2024-20380.json index 2d3e7b27..d9e3ef31 100644 --- a/data/anchore/2024/CVE-2024-20380.json +++ b/data/anchore/2024/CVE-2024-20380.json @@ -3,6 +3,7 @@ "cna": "cisco", "cveId": "CVE-2024-20380", "description": "A vulnerability in the HTML parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\nThe vulnerability is due to an issue in the C to Rust foreign function interface. An attacker could exploit this vulnerability by submitting a crafted file containing HTML content to be scanned by ClamAV on an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software.", + "needsReview": true, "reason": "Added CPE configurations because not yet analyzed by NVD.", "references": [ "https://blog.clamav.net/2024/04/clamav-131-123-106-patch-versions.html" @@ -17,6 +18,7 @@ "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*" ], "product": "ClamAV", + "repo": "https://github.com/cisco-talos/clamav", "vendor": "Cisco", "versions": [ { @@ -26,6 +28,38 @@ "versionType": "custom" } ] + }, + { + "collectionURL": "https://www.clamav.net/downloads", + "packageName": "clamav", + "packageType": "deb", + "product": "ClamAV", + "repo": "https://github.com/cisco-talos/clamav", + "vendor": "Cisco", + "versions": [ + { + "lessThan": "1.3.1", + "status": "affected", + "version": "1.3", + "versionType": "deb" + } + ] + }, + { + "collectionURL": "https://www.clamav.net/downloads", + "packageName": "clamav", + "packageType": "rpm", + "product": "ClamAV", + "repo": "https://github.com/cisco-talos/clamav", + "vendor": "Cisco", + "versions": [ + { + "lessThan": "1.3.1", + "status": "affected", + "version": "1.3", + "versionType": "rpm" + } + ] } ], "providerMetadata": { diff --git a/data/anchore/2024/CVE-2024-20505.json b/data/anchore/2024/CVE-2024-20505.json index 7927be69..6f127360 100644 --- a/data/anchore/2024/CVE-2024-20505.json +++ b/data/anchore/2024/CVE-2024-20505.json @@ -3,6 +3,7 @@ "cna": "cisco", "cveId": "CVE-2024-20505", "description": "A vulnerability in the PDF parsing module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThe vulnerability is due to an out of bounds read. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. An exploit could allow the attacker to terminate the scanning process.", + "needsReview": true, "reason": "Added CPE configurations because not yet analyzed by NVD.", "references": [ "https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html" @@ -17,6 +18,7 @@ "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*" ], "product": "ClamAV", + "repo": "https://github.com/cisco-talos/clamav", "vendor": "Cisco", "versions": [ { @@ -44,6 +46,74 @@ "versionType": "custom" } ] + }, + { + "collectionURL": "https://www.clamav.net/downloads", + "packageName": "clamav", + "packageType": "deb", + "product": "ClamAV", + "repo": "https://github.com/cisco-talos/clamav", + "vendor": "Cisco", + "versions": [ + { + "lessThan": "1.4.1", + "status": "affected", + "version": "1.4", + "versionType": "deb" + }, + { + "lessThan": "1.3.2", + "status": "affected", + "version": "1.1", + "versionType": "deb" + }, + { + "lessThan": "1.0.7", + "status": "affected", + "version": "0.104", + "versionType": "deb" + }, + { + "lessThan": "0.103.12", + "status": "affected", + "version": "0", + "versionType": "deb" + } + ] + }, + { + "collectionURL": "https://www.clamav.net/downloads", + "packageName": "clamav", + "packageType": "rpm", + "product": "ClamAV", + "repo": "https://github.com/cisco-talos/clamav", + "vendor": "Cisco", + "versions": [ + { + "lessThan": "1.4.1", + "status": "affected", + "version": "1.4", + "versionType": "rpm" + }, + { + "lessThan": "1.3.2", + "status": "affected", + "version": "1.1", + "versionType": "rpm" + }, + { + "lessThan": "1.0.7", + "status": "affected", + "version": "0.104", + "versionType": "rpm" + }, + { + "lessThan": "0.103.12", + "status": "affected", + "version": "0", + "versionType": "rpm" + } + ] } ], "providerMetadata": { diff --git a/data/anchore/2024/CVE-2024-20506.json b/data/anchore/2024/CVE-2024-20506.json index 224ba15f..d2971881 100644 --- a/data/anchore/2024/CVE-2024-20506.json +++ b/data/anchore/2024/CVE-2024-20506.json @@ -3,6 +3,7 @@ "cna": "cisco", "cveId": "CVE-2024-20506", "description": "A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files.\r\n\r\nThe vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.", + "needsReview": true, "reason": "Added CPE configurations because not yet analyzed by NVD.", "references": [ "https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html" @@ -17,6 +18,7 @@ "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*" ], "product": "ClamAV", + "repo": "https://github.com/cisco-talos/clamav", "vendor": "Cisco", "versions": [ { @@ -44,6 +46,74 @@ "versionType": "custom" } ] + }, + { + "collectionURL": "https://www.clamav.net/downloads", + "packageName": "clamav", + "packageType": "deb", + "product": "ClamAV", + "repo": "https://github.com/cisco-talos/clamav", + "vendor": "Cisco", + "versions": [ + { + "lessThan": "1.4.1", + "status": "affected", + "version": "1.4", + "versionType": "deb" + }, + { + "lessThan": "1.3.2", + "status": "affected", + "version": "1.1", + "versionType": "deb" + }, + { + "lessThan": "1.0.7", + "status": "affected", + "version": "0.104", + "versionType": "deb" + }, + { + "lessThan": "0.103.12", + "status": "affected", + "version": "0", + "versionType": "deb" + } + ] + }, + { + "collectionURL": "https://www.clamav.net/downloads", + "packageName": "clamav", + "packageType": "rpm", + "product": "ClamAV", + "repo": "https://github.com/cisco-talos/clamav", + "vendor": "Cisco", + "versions": [ + { + "lessThan": "1.4.1", + "status": "affected", + "version": "1.4", + "versionType": "rpm" + }, + { + "lessThan": "1.3.2", + "status": "affected", + "version": "1.1", + "versionType": "rpm" + }, + { + "lessThan": "1.0.7", + "status": "affected", + "version": "0.104", + "versionType": "rpm" + }, + { + "lessThan": "0.103.12", + "status": "affected", + "version": "0", + "versionType": "rpm" + } + ] } ], "providerMetadata": {