CVE-2025-20260

| EUVD-2025-18658 CRITICAL
2025-06-18 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 14, 2026 - 22:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 22:49 euvd
EUVD-2025-18658
CVE Published
Jun 18, 2025 - 18:15 nvd
CRITICAL 9.8

Description

A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition, cause a denial of service (DoS) condition, or execute arbitrary code on an affected device. This vulnerability exists because memory buffers are allocated incorrectly when PDF files are processed. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to trigger a buffer overflow, likely resulting in the termination of the ClamAV scanning process and a DoS condition on the affected software. Although unproven, there is also a possibility that an attacker could leverage the buffer overflow to execute arbitrary code with the privileges of the ClamAV process.

Analysis

A remote code execution vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated (CVSS 9.8). Critical severity with potential for significant impact on affected systems.

Technical Context

CWE-122 (Heap-based Buffer Overflow). CVSS 9.8 indicates critical severity with likely remote exploitation vector. Affects the PDF scanning processes of ClamAV could allow an unauthenticated.

Affected Products

['the PDF scanning processes of ClamAV could allow an unauthenticated']

Remediation

Monitor vendor channels for patch availability. Consider network segmentation to limit exposure if patching is delayed.

Priority Score

50
Low Medium High Critical
KEV: 0
EPSS: +0.6
CVSS: +49
POC: 0

Vendor Status

Ubuntu

Priority: Medium
clamav
Release Status Version
jammy released 1.4.3+dfsg-0ubuntu0.22.04.1
noble released 1.4.3+dfsg-0ubuntu0.24.04.1
oracular released 1.4.3+dfsg-0ubuntu0.24.10.1
plucky released 1.4.3+dfsg-0ubuntu0.25.04.1
upstream released 1.4.3
focal released 1.4.3+dfsg-0ubuntu0.20.04.1+esm1
bionic needed -
trusty needed -
xenial needed -
questing released 1.4.3+dfsg-0ubuntu1

Debian

Bug #1108046
clamav
Release Status Fixed Version Urgency
bullseye fixed 1.0.9+dfsg-1~deb11u1 -
bullseye (security) fixed 1.4.3+dfsg-1~deb11u1 -
bookworm fixed 1.0.9+dfsg-1~deb12u1 -
trixie fixed 1.4.3+dfsg-1 -
forky, sid fixed 1.4.3+dfsg-2 -
(unstable) fixed 1.4.3+dfsg-1 -

Share

CVE-2025-20260 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy