Sunday, April 13, 2025
HomeBuffer over flowOpen-Source ClamAV Releases Security Update for Buffer Overflow Vulnerability - Patch Now

Open-Source ClamAV Releases Security Update for Buffer Overflow Vulnerability – Patch Now

Published on

SIEM as a Service

Follow Us on Google News

ClamAV, a widely used open-source antivirus software, has released security patch updates to address a critical buffer overflow vulnerability (CVE-2025-20128).

The vulnerability, identified in the OLE2 file parser, posed a potential risk of denial-of-service (DoS) attacks. Users are urged to update immediately to the newly-released ClamAV versions 1.4.2 and 1.0.8 to safeguard their systems.

Details of the Vulnerability

The critical vulnerability, reported by OSS-Fuzz, was discovered in the OLE2 file parser of ClamAV. It could result in a buffer overflow read, enabling attackers to crash the application and potentially disrupt services.

- Advertisement - Google News

Introduced in version 1.0.0, this issue affects all currently supported versions of ClamAV, necessitating an urgent update.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

What’s New in the Security Patches?

ClamAV 1.4.2

The 1.4.2 patch addresses the CVE-2025-20128 vulnerability, effectively removing the buffer overflow risk in the OLE2 file parser.

This update is critical for ensuring continued stability and functionality of the antivirus software.

ClamAV 1.0.8

ClamAV also released version 1.0.8, a patch specifically for older systems. Alongside the fix for CVE-2025-20128, it resolves a long-standing issue in the ClamOnAcc feature, which previously caused an infinite loop when monitoring non-existent directories.

This improvement is a backport from ClamAV 1.3.0.

How to Update

Both ClamAV 1.4.2 and 1.0.8 are available for download on the official ClamAV downloads page and the GitHub Release page.

Docker Hub images will also be updated, though availability may be slightly delayed. Users are strongly encouraged to download and deploy the updates immediately to mitigate the risks posed by this vulnerability.

System administrators managing ClamAV deployments via Docker should monitor Docker Hub for the latest images.

ClamAV extends its gratitude to OSS-Fuzz for identifying the vulnerability and for its contributions to enhancing the security of open-source projects.

With the growing threat landscape, keeping software up to date is critical. ClamAV continues to demonstrate its commitment to protecting users by addressing vulnerabilities promptly.

Update to the latest versions of ClamAV now and ensure your systems are secure!

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...