clamav vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the clamav package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Input Validation

<0.101.5+dfsg-0+deb8u2
  • H
Improper Input Validation

<0.101.5+dfsg-0+deb8u2
  • M
Resource Exhaustion

<0.101.5+dfsg-0+deb8u1
  • H
Improper Resource Shutdown or Release

<0.101.4+dfsg-0+deb8u1
  • C
Out-of-bounds Write

<0.101.4+dfsg-0+deb8u1
  • H
Out-of-bounds Read

<0.100.3+dfsg-0+deb8u1
  • M
Out-of-bounds Read

<0.100.3+dfsg-0+deb8u1
  • M
Out-of-bounds Write

<0.100.3+dfsg-0+deb8u1
  • M
Out-of-bounds Read

<0.100.2+dfsg-0+deb8u1
  • L
Improper Input Validation

<0.100.1+dfsg-0+deb8u1
  • M
Integer Overflow or Wraparound

<0.100.1+dfsg-0+deb8u1
  • C
Out-of-bounds Write

<0.90-1
  • C
Out-of-Bounds

<0.97.7+dfsg-1
  • H
Information Exposure

<0.97.7+dfsg-1
  • C
Buffer Overflow

<0.97.7+dfsg-1
  • C
CVE-2007-6745

<0.91.2-1~volatile1
  • M
Out-of-bounds Read

<0.100.0~beta+dfsg-2
  • M
Out-of-bounds Read

<0.99.3~beta1+dfsg-1
  • H
NULL Pointer Dereference

<0.99.2+dfsg-0+deb8u3
  • C
Out-of-bounds Read

<0.99.2+dfsg-0+deb8u3
  • H
Use After Free

<0.99.2+dfsg-0+deb8u3
  • H
Out-of-Bounds

<0.99.2+dfsg-0+deb8u3
  • C
Out-of-Bounds

<0.99.2+dfsg-0+deb8u3
  • M
Out-of-bounds Read

<0.99.2+dfsg-0+deb8u3
  • H
Out-of-Bounds

<0.99.2+dfsg-0+deb8u3
  • M
Out-of-bounds Read

<0.99.2+dfsg-0+deb8u3
  • H
Out-of-Bounds

<0.99.3~beta1+dfsg-1
  • M
Use After Free

<0.99.2+dfsg-0+deb8u3
  • M
Out-of-bounds Read

<0.99.3~beta1+dfsg-1
  • M
Improper Access Control

<0.99.2+dfsg-0+deb8u1
  • M
Improper Access Control

<0.99.2+dfsg-0+deb8u1
  • H
Out-of-Bounds

<0.99+dfsg-1
  • M
Resource Management Errors

<0.98.7+dfsg-0+deb8u1
  • M
Resource Management Errors

<0.98.7+dfsg-0+deb8u1
  • M
Resource Management Errors

<0.98.7+dfsg-0+deb8u1
  • M
Resource Management Errors

<0.98.7+dfsg-0+deb8u1
  • M
Numeric Errors

<0.98.7+dfsg-0+deb8u1
  • H
Out-of-Bounds

<0.98.6+dfsg-1
  • H
Out-of-Bounds

<0.98.6+dfsg-1
  • H
Out-of-Bounds

<0.98.6+dfsg-1
  • M
Code

<0.98.6+dfsg-1
  • M
Out-of-Bounds

<0.98.5+dfsg-1
  • M
Code

<0.98.5+dfsg-1
  • M
Out-of-Bounds

<0.97.8+dfsg-1
  • M
Numeric Errors

<0.97.8+dfsg-1
  • M
Access Restriction Bypass

<0.97.5+dfsg-1
  • M
Access Restriction Bypass

<0.97.5+dfsg-1
  • M
Access Restriction Bypass

<0.97.5+dfsg-1
  • M
Access Restriction Bypass

<0.97.5+dfsg-1
  • M
Numeric Errors

<0.97.3+dfsg-1
  • M
Numeric Errors

<0.97.2+dfsg-1
  • M
Resource Management Errors

<0.97+dfsg-1
  • M
CVE-2010-4260

<0.96.5+dfsg-1
  • H
Numeric Errors

<0.96.5+dfsg-1
  • H
CVE-2010-4479

<0.96.5+dfsg-1
  • H
Out-of-Bounds

<0.96.3+dfsg-1
  • M
Numeric Errors

<0.96.3+dfsg-1
  • M
CVE-2010-1639

<0.96.1+dfsg-1
  • M
Numeric Errors

<0.96.1+dfsg-1
  • C
CVE-2010-0098

<0.96+dfsg-1
  • M
Improper Input Validation

<0.96+dfsg-2
  • H
CVE-2009-3736

<0.95+dfsg-1
  • M
CVE-2008-6845

<0.94.dfsg-1
  • C
Out-of-Bounds

<0.95.1+dfsg-1
  • M
Improper Input Validation

<0.95.1+dfsg-1
  • H
Arbitrary Code Injection

<0.95.1+dfsg-1
  • M
Numeric Errors

<0.95.1+dfsg-1
  • H
CVE-2009-1241

<0.95+dfsg-1
  • M
Resource Management Errors

<0.94.dfsg.2-1
  • H
Out-of-Bounds

<0.94.dfsg.1-1
  • M
Memory Leak

<0.94.dfsg-1
  • C
Information Exposure

<0.94.dfsg-1
  • M
Resource Management Errors

<0.94.dfsg-1
  • M
Resource Management Errors

<0.94.dfsg-1
  • M
Resource Management Errors

<0.93.1.dfsg-1.1
  • M
Resource Management Errors

<0.93.1.dfsg-1.1
  • M
CVE-2008-1387

<0.92.1~dfsg2-1
  • H
Out-of-Bounds

<0.92.1~dfsg2-1
  • H
Out-of-Bounds

<0.92.1~dfsg2-1.1
  • C
Out-of-Bounds

<0.92.1~dfsg2-1
  • C
Numeric Errors

<0.92.1~dfsg-1
  • C
Resource Management Errors

<0.92.1~dfsg-1
  • M
Link Following

<0.92.1~dfsg-1
  • M
Improper Input Validation

<0.92.1~dfsg-1
  • C
CVE-2007-6337

<0.92~dfsg-1~volatile2
  • H
Numeric Errors

<0.92~dfsg-1~volatile2
  • M
Out-of-Bounds

<0.92~dfsg-1~volatile2
  • H
OS Command Injection

<0.91.2-1~volatile1
  • M
CVE-2007-4510

<0.91.2-1~volatile1
  • M
CVE-2007-3725

<0.91-1
  • M
CVE-2007-3024

<0.90.3-1
  • C
CVE-2007-3023

<0.90.3-1
  • M
CVE-2007-3122

<0.90.3-1
  • M
CVE-2007-3123

<0.90.3-1
  • M
Resource Exhaustion

<0.90.2-1
  • H
Resource Management Errors

<0.90.2-1
  • H
CVE-2007-1997

<0.90.2-1
  • M
CVE-2007-1745

<0.90.2-1
  • M
Directory Traversal

<0.90-1
  • H
CVE-2007-0897

<0.90-1
  • M
CVE-2006-6481

<0.88.7-1
  • M
CVE-2006-6406

<0.88.7-1
  • M
CVE-2006-5874

<0.86-1
  • H
CVE-2006-4182

<0.88.5-1
  • M
CVE-2006-5295

<0.88.5-1
  • H
Out-of-Bounds

<0.88.4-1
  • M
CVE-2006-1989

<0.88.2
  • M
CVE-2006-1630

<0.88.1-1
  • C
Use of Externally-Controlled Format String

<0.88.1-1
  • M
CVE-2006-1614

<0.88.1-1
  • H
CVE-2006-0162

<0.88-1
  • C
CVE-2005-3587

<0.87.1-1
  • H
CVE-2005-3303

<0.87.1-1
  • M
CVE-2005-3500

<0.87.1-1
  • M
Resource Management Errors

<0.87.1-1
  • H
CVE-2005-3239

<0.87.1-1
  • H
CVE-2005-2920

<0.87-1
  • M
Resource Management Errors

<0.87-1
  • H
CVE-2005-2450

<0.86.2-1
  • M
CVE-2005-1922

<0.86.1-1
  • L
CVE-2005-1923

<0.86.1
  • M
CVE-2005-2070

<0.86.1
  • L
CVE-2005-2056

<0.86.1-1
  • M
CVE-2005-0133

<0.80-0.81rc1-1
  • M
CVE-2005-0218

<0.81
  • L
CVE-2004-1909

<0.68.1
  • M
CVE-2004-0270

<0.80
  • M
CVE-2004-1876

<0.70-1
  • H
CVE-2003-0946

<0.65