Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2013-2021
pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.094
EPSS Ranking
92.4%
CVSS Severity
CVSS v2 Score
4.3
References
http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html
http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html
http://secunia.com/advisories/53150
http://secunia.com/advisories/53182
http://support.apple.com/kb/HT5880
http://support.apple.com/kb/HT5892
http://www.mandriva.com/security/advisories?name=MDVSA-2013:159
http://www.openwall.com/lists/oss-security/2013/04/25/2
http://www.openwall.com/lists/oss-security/2013/04/29/20
http://www.securityfocus.com/bid/59434
http://www.ubuntu.com/usn/USN-1816-1
https://bugzilla.clamav.net/show_bug.cgi?id=7053
https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971
http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html
http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109514.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109639.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109652.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105575.html
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html
http://secunia.com/advisories/53150
http://secunia.com/advisories/53182
http://support.apple.com/kb/HT5880
http://support.apple.com/kb/HT5892
http://www.mandriva.com/security/advisories?name=MDVSA-2013:159
http://www.openwall.com/lists/oss-security/2013/04/25/2
http://www.openwall.com/lists/oss-security/2013/04/29/20
http://www.securityfocus.com/bid/59434
http://www.ubuntu.com/usn/USN-1816-1
https://bugzilla.clamav.net/show_bug.cgi?id=7053
https://github.com/vrtadmin/clamav-devel/commit/24ff855c82d3f5c62bc5788a5776cefbffce2971
Products affected by CVE-2013-2021
Clamav
»
Clamav
»
Version:
0.97.1
cpe:2.3:a:clamav:clamav:0.97.1
Clamav
»
Clamav
»
Version:
0.97.2
cpe:2.3:a:clamav:clamav:0.97.2
Clamav
»
Clamav
»
Version:
0.97.3
cpe:2.3:a:clamav:clamav:0.97.3
Clamav
»
Clamav
»
Version:
0.97.4
cpe:2.3:a:clamav:clamav:0.97.4
Clamav
»
Clamav
»
Version:
0.97.5
cpe:2.3:a:clamav:clamav:0.97.5
Clamav
»
Clamav
»
Version:
0.97.6
cpe:2.3:a:clamav:clamav:0.97.6
Clamav
»
Clamav
»
Version:
0.97.7
cpe:2.3:a:clamav:clamav:0.97.7
Canonical
»
Ubuntu Linux
»
Version:
10.04
cpe:2.3:o:canonical:ubuntu_linux:10.04
Canonical
»
Ubuntu Linux
»
Version:
11.10
cpe:2.3:o:canonical:ubuntu_linux:11.10
Canonical
»
Ubuntu Linux
»
Version:
12.04
cpe:2.3:o:canonical:ubuntu_linux:12.04
Canonical
»
Ubuntu Linux
»
Version:
12.10
cpe:2.3:o:canonical:ubuntu_linux:12.10
Canonical
»
Ubuntu Linux
»
Version:
13.04
cpe:2.3:o:canonical:ubuntu_linux:13.04
Suse
»
Linux Enterprise Server
»
Version:
11.0
cpe:2.3:o:suse:linux_enterprise_server:11.0
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved