CVE-2020-3327
📋 TL;DR
A heap buffer overflow vulnerability in ClamAV's ARJ archive parsing module allows remote attackers to cause denial of service by crashing the scanning process. This affects ClamAV version 0.102.2 specifically. Any system using vulnerable ClamAV for scanning ARJ files is at risk.
💻 Affected Systems
- Clam AntiVirus (ClamAV)
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
⚠️ Risk & Real-World Impact
Worst Case
Complete denial of antivirus scanning service, potentially allowing malware to bypass detection while ClamAV is down.
Likely Case
ClamAV scanning process crashes when processing malicious ARJ files, requiring service restart and causing temporary scanning disruption.
If Mitigated
With proper network controls and updated software, impact is limited to isolated scanning failures with automatic service recovery.
🎯 Exploit Status
Exploitation requires sending a specially crafted ARJ file to trigger the buffer overflow. No authentication needed if scanning service is accessible.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: ClamAV 0.102.3 and later
Vendor Advisory: https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
Restart Required: Yes
Instructions:
1. Download ClamAV 0.102.3 or later from official sources. 2. Stop ClamAV services. 3. Install the updated version. 4. Update virus definitions. 5. Restart ClamAV services.
🔧 Temporary Workarounds
Disable ARJ scanning
allTemporarily disable ARJ archive scanning in ClamAV configuration
Edit clamd.conf and add: ArchiveBlockEncrypted no
Or modify scanning rules to exclude .arj files
Network isolation
linuxRestrict network access to ClamAV scanning services
iptables -A INPUT -p tcp --dport 3310 -j DROP (for clamd)
Configure firewall to allow only trusted sources
🧯 If You Can't Patch
- Implement network segmentation to limit access to ClamAV scanning services
- Deploy intrusion detection systems to monitor for ARJ file submission attempts
🔍 How to Verify
Check if Vulnerable:
Run: clamscan --version | grep 'ClamAV 0.102.2'
Check Version:
clamscan --version
Verify Fix Applied:
Run: clamscan --version | grep -E 'ClamAV 0.102.[3-9]|ClamAV 0.10[3-9]|ClamAV [1-9]'
📡 Detection & Monitoring
Log Indicators:
- ClamAV process crashes in system logs
- Repeated ClamAV service restarts
- ARJ file scanning failures
Network Indicators:
- Unusual ARJ file submissions to scanning services
- Multiple connection attempts to ClamAV ports
SIEM Query:
source="clamav.log" AND ("crash" OR "segmentation fault" OR "buffer overflow")
🔗 References
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- https://lists.debian.org/debian-lts-announce/2020/05/msg00018.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00010.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ67VH37NCG25PICGWFWZHSVG7PBT7MC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK/
- https://security.gentoo.org/glsa/202007-23
- https://usn.ubuntu.com/4370-1/
- https://usn.ubuntu.com/4370-2/
- https://usn.ubuntu.com/4435-1/
- https://usn.ubuntu.com/4435-2/
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- https://lists.debian.org/debian-lts-announce/2020/05/msg00018.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00010.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ67VH37NCG25PICGWFWZHSVG7PBT7MC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK/
- https://security.gentoo.org/glsa/202007-23
- https://usn.ubuntu.com/4370-1/
- https://usn.ubuntu.com/4370-2/
- https://usn.ubuntu.com/4435-1/
- https://usn.ubuntu.com/4435-2/