A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://nvd.nist.gov/vuln/detail/CVE-2019-9169 below:

NVD - CVE-2019-9169

Modified

This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.

Description

In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.


Metrics  

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.

CVSS 4.0 Severity and Vector Strings:

NIST: NVD

NVD assessment not yet provided.

CVSS 3.x Severity and Vector Strings:

NIST: NVD

Vector:  CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0 Severity and Vector Strings:

NIST: NVD

Vector:  (AV:N/AC:L/Au:N/C:P/I:P/A:P)

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration CWE-ID CWE Name Source CWE-125 Out-of-bounds Read NIST   Change History 14 change records found show changes CVE Modified by CVE 11/20/2024 11:51:07 PM Action Type Old Value New Value Added Reference
http://www.securityfocus.com/bid/107160
Added Reference
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
Added Reference
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
Added Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
Added Reference
https://security.gentoo.org/glsa/202006-04
Added Reference
https://security.netapp.com/advisory/ntap-20190315-0002/
Added Reference
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
Added Reference
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9
Added Reference
https://support.f5.com/csp/article/K54823184
Added Reference
https://usn.ubuntu.com/4416-1/
Added Reference
https://www.oracle.com/security-alerts/cpuapr2022.html
CVE Modified by MITRE 5/14/2024 2:10:06 AM Action Type Old Value New Value CVE Modified by MITRE 11/06/2023 10:13:36 PM Action Type Old Value New Value Added Reference
MITRE https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9 [No types assigned]
Removed Reference
MITRE https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
Modified Analysis by NIST 6/13/2022 2:59:18 PM Action Type Old Value New Value Added CVSS V3.1
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Removed CVSS V3
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CPE Configuration
OR
     *cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:* versions from (including) 7.7.2.0 up to (excluding) 7.7.2.21
     *cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:* versions from (including) 7.8.2.0 up to (excluding) 7.8.2.8
     *cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:* versions from (including) 8.0.0 up to (excluding) 8.1.1
Added CPE Configuration
OR
     *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
Changed Reference Type
http://www.securityfocus.com/bid/107160 Third Party Advisory, VDB Entry
http://www.securityfocus.com/bid/107160 Broken Link
Changed Reference Type
https://kc.mcafee.com/corporate/index?page=content&id=SB10278 No Types Assigned
https://kc.mcafee.com/corporate/index?page=content&id=SB10278 Third Party Advisory
Changed Reference Type
https://security.gentoo.org/glsa/202006-04 No Types Assigned
https://security.gentoo.org/glsa/202006-04 Third Party Advisory
Changed Reference Type
https://support.f5.com/csp/article/K54823184 No Types Assigned
https://support.f5.com/csp/article/K54823184 Third Party Advisory
Changed Reference Type
https://usn.ubuntu.com/4416-1/ No Types Assigned
https://usn.ubuntu.com/4416-1/ Third Party Advisory
Changed Reference Type
https://www.oracle.com/security-alerts/cpuapr2022.html No Types Assigned
https://www.oracle.com/security-alerts/cpuapr2022.html Not Applicable
CVE Modified by MITRE 4/19/2022 8:15:20 PM Action Type Old Value New Value Added Reference
https://www.oracle.com/security-alerts/cpuapr2022.html [No Types Assigned]
CVE Modified by MITRE 7/09/2020 4:15:13 PM Action Type Old Value New Value Added Reference
https://usn.ubuntu.com/4416-1/ [No Types Assigned]
CVE Modified by MITRE 6/12/2020 11:15:11 PM Action Type Old Value New Value Added Reference
https://security.gentoo.org/glsa/202006-04 [No Types Assigned]
CVE Modified by MITRE 4/16/2019 1:29:00 AM Action Type Old Value New Value Added Reference
https://support.f5.com/csp/article/K54823184 [No Types Assigned]
CVE Modified by MITRE 4/10/2019 4:29:01 AM Action Type Old Value New Value Added Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10278 [No Types Assigned]
Modified Analysis by NIST 3/15/2019 2:39:57 PM Action Type Old Value New Value Added CPE Configuration
OR
     *cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
Changed Reference Type
https://security.netapp.com/advisory/ntap-20190315-0002/ No Types Assigned
https://security.netapp.com/advisory/ntap-20190315-0002/ Patch, Third Party Advisory
CVE Modified by MITRE 3/15/2019 6:29:19 AM Action Type Old Value New Value Added Reference
https://security.netapp.com/advisory/ntap-20190315-0002/ [No Types Assigned]
Modified Analysis by NIST 2/27/2019 10:26:35 AM Action Type Old Value New Value Changed Reference Type
http://www.securityfocus.com/bid/107160 No Types Assigned
http://www.securityfocus.com/bid/107160 Third Party Advisory, VDB Entry
CVE Modified by MITRE 2/27/2019 6:29:06 AM Action Type Old Value New Value Added Reference
http://www.securityfocus.com/bid/107160 [No Types Assigned]
Initial Analysis by NIST 2/26/2019 2:26:03 PM Action Type Old Value New Value Added CVSS V3
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CVSS V2
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Added CWE
CWE-125
Added CPE Configuration
OR
     *cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* versions up to (including) 2.29
Changed Reference Type
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140 No Types Assigned
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140 Exploit, Mailing List, Vendor Advisory
Changed Reference Type
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142 No Types Assigned
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142 Exploit, Mailing List, Vendor Advisory
Changed Reference Type
https://sourceware.org/bugzilla/show_bug.cgi?id=24114 No Types Assigned
https://sourceware.org/bugzilla/show_bug.cgi?id=24114 Issue Tracking, Patch, Third Party Advisory
Changed Reference Type
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9 No Types Assigned
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9 Mailing List, Patch, Third Party Advisory

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4