ID

VAR-201902-0855


CVE

CVE-2019-7317


TITLE

libpng CVE-2019-7317 Use After Free Denial of Service Vulnerability

Trust: 0.3

sources: BID: 108098

DESCRIPTION

png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute. libpng is prone to a denial-of-service vulnerability. An attacker may exploit this issue to crash the affected application, resulting in a denial-of-service condition. libpng version 1.6.36 is vulnerable; other versions may also be affected. ========================================================================== Ubuntu Security Notice USN-3991-1 May 21, 2019 firefox vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 19.04 - Ubuntu 18.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Firefox could be made to crash or run programs as your login if it opened a malicious website. Software Description: - firefox: Mozilla Open Source web browser Details: Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, spoof the browser UI, trick the user in to launching local executable binaries, obtain sensitive information, conduct cross-site scripting (XSS) attacks, or execute arbitrary code. (CVE-2019-11691, CVE-2019-11692, CVE-2019-11693, CVE-2019-11695, CVE-2019-11696, CVE-2019-11699, CVE-2019-11701, CVE-2019-7317, CVE-2019-9800, CVE-2019-9814, CVE-2019-9817, CVE-2019-9819, CVE-2019-9820, CVE-2019-9821) It was discovered that pressing certain key combinations could bypass addon installation prompt delays. If a user opened a specially crafted website, an attacker could potentially exploit this to trick them in to installing a malicious extension. (CVE-2019-11697) It was discovered that history data could be exposed via drag and drop of hyperlinks to and from bookmarks. If a user were tricked in to dragging a specially crafted hyperlink to the bookmark toolbar or sidebar, and subsequently back in to the web content area, an attacker could potentially exploit this to obtain sensitive information. (CVE-2019-11698) A type confusion bug was discovered with object groups and UnboxedObjects. (CVE-2019-9816) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 19.04: firefox 67.0+build2-0ubuntu0.19.04.1 Ubuntu 18.10: firefox 67.0+build2-0ubuntu0.18.10.1 Ubuntu 18.04 LTS: firefox 67.0+build2-0ubuntu0.18.04.1 Ubuntu 16.04 LTS: firefox 67.0+build2-0ubuntu0.16.04.1 After a standard system update you need to restart Firefox to make all the necessary changes. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: java-1.7.1-ibm security update Advisory ID: RHSA-2019:2495-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2019:2495 Issue date: 2019-08-15 CVE Names: CVE-2019-2762 CVE-2019-2769 CVE-2019-2816 CVE-2019-7317 CVE-2019-11775 ===================================================================== 1. Summary: An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux Server Supplementary (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 7) - x86_64 3. Description: IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 7 to version 7R1 SR4-FP50. Security Fix(es): * IBM JDK: Failure to privatize a value pulled out of the loop by versioning (CVE-2019-11775) * OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762) * OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769) * OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816) * libpng: use-after-free in png_image_free in png.c (CVE-2019-7317) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of IBM Java must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1672409 - CVE-2019-7317 libpng: use-after-free in png_image_free in png.c 1730056 - CVE-2019-2769 OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) 1730099 - CVE-2019-2816 OpenJDK: Missing URL format validation (Networking, 8221518) 1730415 - CVE-2019-2762 OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) 1738549 - CVE-2019-11775 IBM JDK: Failure to privatize a value pulled out of the loop by versioning 6. Package List: Red Hat Enterprise Linux Client Supplementary (v. 7): x86_64: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Supplementary (v. 7): x86_64: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 7): ppc64: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el7.ppc64.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el7.ppc64.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el7.ppc64.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el7.ppc64.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el7.ppc64.rpm ppc64le: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el7.ppc64le.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el7.ppc64le.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el7.ppc64le.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el7.ppc64le.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el7.ppc64le.rpm s390x: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el7.s390x.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el7.s390x.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el7.s390x.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el7.s390x.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el7.s390x.rpm x86_64: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 7): x86_64: java-1.7.1-ibm-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.4.50-1jpp.1.el7.x86_64.rpm java-1.7.1-ibm-src-1.7.1.4.50-1jpp.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-2762 https://access.redhat.com/security/cve/CVE-2019-2769 https://access.redhat.com/security/cve/CVE-2019-2816 https://access.redhat.com/security/cve/CVE-2019-7317 https://access.redhat.com/security/cve/CVE-2019-11775 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXVUfj9zjgjWX9erEAQgHKg/+JGYAGvI9M07jVnyx/aVilNzoHRbbyA9k ZOdfkTRvXD3Einlrwpe0NV6UPygQ6kiLGE1YdlO3LluoLJupasBXpgCKCeSee/bN Ie1mLvXswfzOzGLIHGTeY7bSTGgjP99+7GzTrpKSbf3wl8LGAdx42EJ0ecIMUIyQ E0YpbV9h6M77ItWpeI88aIy6n74xu40kkZA3GupPQxBVfFJlkMJgwOdE4Nwi1b50 48f0UjQkxZ6bl0imx+rUoboCbgH2iohf45GmLqF0OgwDUeq0MkXYARXkqzaA7NOU ADwFxOFcj0SJ7LJXjFRQa9i+D2KKRHbXTmn/PaXnM6J6BEycsFfwLXnqVqdrTUtb RJ00k4yPMjADkmTuwdS0GNL9wa0YWtBja1By2n+S49AbA36CysmuVAAMfq5JYnHB 5F2IqlnQvu6EZl84psq692WWKZPiBzgvSVTfi0+VNPyN9Omsn85/sw2wkXMvPMJZ DAeRLKKgoWMv8bNzOAd9rvO/z6DO6fYKSygFsMN6f2vfG61KuHnD/n2uot929/G8 4vPqxTcVMvUjXjPNqZtMXJpmqV/m0OjzzfbEFzLNlHnMNvkzLiMH3MJxZ+SaL0uU Y8uI6vVttVB37hjkZAA/+cK753smTsFa+Ol54Wl8ULei4tRGdHc7hGII/9nL5OTr 7J6ryPGM2HA= =nXZW -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201908-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: libpng: Multiple vulnerabilities Date: August 03, 2019 Bugs: #683366 ID: 201908-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in libpng, the worst of which could result in a Denial of Service condition. Background ========== libpng is a standard library used to process PNG (Portable Network Graphics) images. It is used by several programs, including web browsers and potentially server processes. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker, by enticing a user to process a specially crafted PNG file, could cause a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All libpng users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.6.37" References ========== [ 1 ] CVE-2018-14048 https://nvd.nist.gov/vuln/detail/CVE-2018-14048 [ 2 ] CVE-2018-14550 https://nvd.nist.gov/vuln/detail/CVE-2018-14550 [ 3 ] CVE-2019-7317 https://nvd.nist.gov/vuln/detail/CVE-2019-7317 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201908-02 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2019 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/mozilla-firefox-60.7.0esr-i686-1_slack14.2.txz: Upgraded. This release contains security fixes and improvements. Some of the patched flaws are considered critical, and could be used to run attacker code and install software, requiring no user interaction beyond normal browsing. For more information, see: https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/ https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-9815 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-9816 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-9817 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-9818 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-9819 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-9820 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-11691 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-11692 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-11693 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-7317 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-9797 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2018-18511 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-11694 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-11698 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-5798 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14/#CVE-2019-9800 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/mozilla-firefox-60.7.0esr-i686-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/mozilla-firefox-60.7.0esr-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/mozilla-firefox-60.7.0esr-i686-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/mozilla-firefox-60.7.0esr-x86_64-1.txz MD5 signatures: +-------------+ Slackware 14.2 package: 9bb86b28639fe241a285ae8868f6fd3c mozilla-firefox-60.7.0esr-i686-1_slack14.2.txz Slackware x86_64 14.2 package: 71cfd983350a89459015e89af1f4cf46 mozilla-firefox-60.7.0esr-x86_64-1_slack14.2.txz Slackware -current package: 02f5b3d10ba9ef7a094f862b1a9b4120 xap/mozilla-firefox-60.7.0esr-i686-1.txz Slackware x86_64 -current package: b4ccd8857ce8355105c0595cf2d84154 xap/mozilla-firefox-60.7.0esr-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg mozilla-firefox-60.7.0esr-i686-1_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address

Trust: 1.89

sources: NVD: CVE-2019-7317 // BID: 108098 // VULMON: CVE-2019-7317 // PACKETSTORM: 152702 // PACKETSTORM: 152982 // PACKETSTORM: 154457 // PACKETSTORM: 154068 // PACKETSTORM: 153866 // PACKETSTORM: 153002 // PACKETSTORM: 154282

AFFECTED PRODUCTS

vendor:opensusemodel:package hubscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:19.04

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for scientific computingscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:satellitescope:eqversion:5.8

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for scientific computingscope:eqversion:7.0

Trust: 1.0

vendor:oraclemodel:hyperion infrastructure technologyscope:eqversion:11.2.6.0

Trust: 1.0

vendor:hpemodel:xp7 command view advanced edition suitescope:ltversion:8.7.0-00

Trust: 1.0

vendor:netappmodel:snapmanagerscope:eqversion:3.4.2

Trust: 1.0

vendor:oraclemodel:java sescope:eqversion:8u212

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:ltversion:9.6

Trust: 1.0

vendor:netappmodel:e-series santricity storage managerscope:ltversion:11.53

Trust: 1.0

vendor:libpngmodel:libpngscope:ltversion:1.6.37

Trust: 1.0

vendor:netappmodel:e-series santricity managementscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:netappmodel:steelstorescope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:libpngmodel:libpngscope:gteversion:1.6.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:netappmodel:oncommand insightscope:ltversion:7.3.9

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:mysqlscope:ltversion:8.0.23

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:12.0.1

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:8.0

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:42.3

Trust: 1.0

vendor:redhatmodel:enterprise linux for power little endianscope:eqversion:8.0

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion:9.6

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:netappmodel:oncommand workflow automationscope:ltversion:5.1

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:11.0.3

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion: -

Trust: 1.0

vendor:netappmodel:e-series santricity web servicesscope:ltversion:4.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:6.0

Trust: 1.0

vendor:netappmodel:snapmanagerscope:ltversion:3.4.2

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:8.0

Trust: 1.0

vendor:netappmodel:e-series santricity unified managerscope:ltversion:3.2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.10

Trust: 1.0

vendor:oraclemodel:java sescope:eqversion:7u221

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7.0

Trust: 1.0

vendor:netappmodel:plug-in for symantec netbackupscope:eqversion: -

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.1

Trust: 1.0

vendor:hpmodel:xp7 command viewscope:ltversion:8.7.0-00

Trust: 1.0

vendor:redhatmodel:enterprise linux for power little endianscope:eqversion:7.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:libpngmodel:libpngscope:eqversion:1.6.36

Trust: 0.3

vendor:libpngmodel:libpngscope:neversion:1.6.37

Trust: 0.3

sources: BID: 108098 // NVD: CVE-2019-7317

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-7317
value: MEDIUM

Trust: 1.0

VULMON: CVE-2019-7317
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2019-7317
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

nvd@nist.gov: CVE-2019-7317
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULMON: CVE-2019-7317 // NVD: CVE-2019-7317

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.0

sources: NVD: CVE-2019-7317

THREAT TYPE

network

Trust: 0.3

sources: BID: 108098

TYPE

Design Error

Trust: 0.3

sources: BID: 108098

PATCH

title:Debian CVElist Bug Report Logs: libpng1.6: CVE-2019-7317: use-after-free in png_image_free in png.curl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=ef2bbc82329f4e3dd9e23c0137af2a7b

Trust: 0.1

title:Ubuntu Security Notice: libpng1.6 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3962-1

Trust: 0.1

title:Debian Security Advisories: DSA-4435-1 libpng1.6 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=d60ba88361ab9afdcad18ca2a106ac3b

Trust: 0.1

title:Red Hat: Important: java-1.7.1-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192494 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-1.7.1-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192495 - Security Advisory

Trust: 0.1

title:Arch Linux Advisories: [ASA-201904-10] libpng: denial of serviceurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201904-10

Trust: 0.1

title:Red Hat: Important: java-1.8.0-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192737 - Security Advisory

Trust: 0.1

title:Red Hat: CVE-2019-7317url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2019-7317

Trust: 0.1

title:Red Hat: Important: java-1.8.0-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192585 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-1.8.0-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192590 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-1.8.0-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192592 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2019-7317

Trust: 0.1

title:Red Hat: Important: thunderbird security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191308 - Security Advisory

Trust: 0.1

title:Red Hat: Important: thunderbird security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191310 - Security Advisory

Trust: 0.1

title:Red Hat: Critical: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191265 - Security Advisory

Trust: 0.1

title:Red Hat: Critical: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191269 - Security Advisory

Trust: 0.1

title:Red Hat: Important: thunderbird security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191309 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: openjdk-lts vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4083-1

Trust: 0.1

title:Red Hat: Critical: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191267 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: openjdk-8 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4080-1

Trust: 0.1

title:Ubuntu Security Notice: thunderbird vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3997-1

Trust: 0.1

title:Debian Security Advisories: DSA-4451-1 thunderbird -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=1cf7f39c2c474666174a69cf97b06740

Trust: 0.1

title:Ubuntu Security Notice: firefox regressionurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3991-3

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect AIXurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=61e62f4d9c861153c6391afc0ec560a4

Trust: 0.1

title:Debian Security Advisories: DSA-4448-1 firefox-esr -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=e2d9ccf571c31c1011ad31af2798140f

Trust: 0.1

title:Ubuntu Security Notice: firefox regressionurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3991-2

Trust: 0.1

title:Ubuntu Security Notice: firefox vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3991-1

Trust: 0.1

title:Arch Linux Advisories: [ASA-201905-8] thunderbird: multiple issuesurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201905-8

Trust: 0.1

title:Amazon Linux 2: ALAS2-2019-1246url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2019-1246

Trust: 0.1

title:Mozilla: Mozilla Foundation Security Advisory 2019-14url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=2019-14

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple Mozilla Firefox vulnerability in IBM SONASurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=4a8e20a238934bc47ca332a3c76cc9c3

Trust: 0.1

title:Hitachi Security Advisories: Multiple Vulnerabilities in Hitachi Command Suite, Hitachi Automation Director, Hitachi Configuration Manager and Hitachi Infrastructure Analytics Advisorurl:https://vulmon.com/vendoradvisory?qidtp=hitachi_security_advisories&qid=hitachi-sec-2019-117

Trust: 0.1

title:IBM: Security Bulletin: Multiple vulnerabilities affect IBM Cloud Object Storage Systems (January 2020v2)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=acad3ac1b2767940a01b72ed1b51586b

Trust: 0.1

title:Arch Linux Advisories: [ASA-201905-9] firefox: multiple issuesurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201905-9

Trust: 0.1

title:Hitachi Security Advisories: Multiple Vulnerabilities in Cosminexusurl:https://vulmon.com/vendoradvisory?qidtp=hitachi_security_advisories&qid=hitachi-sec-2019-116

Trust: 0.1

title:Amazon Linux 2: ALAS2-2019-1229url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2019-1229

Trust: 0.1

title:Mozilla: Security vulnerabilities fixed in Firefox ESR 60.7url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=554d832b08166d6d04a53f3c421e7f9b

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM SDK, Java Technology Edition Quarterly CPU – Jul 2019 – Includes Oracle Jul 2019 CPU affects IBM Tivoli Composite Application Manager for Transactions-Robotic Response Timeurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=de7b9859dff396513e72da22ffc4ab3e

Trust: 0.1

title:Mozilla: Mozilla Foundation Security Advisory 2019-15url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=2019-15

Trust: 0.1

title:Mozilla: Security vulnerabilities fixed in Thunderbird 60.7url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=198e3a670ab8c803584e801da3919e61

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple vulnerabilities may affect IBM® SDK, Java™ Technology Editionurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=836b059f33e614408bd51705b325caaf

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterpriseurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=b352b6737bfbf2a62b0a2201928e8963

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Cloud Manager with OpenStackurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=1ad5c6091de269fb79e0c4d1c06b0846

Trust: 0.1

title:Mozilla: Security vulnerabilities fixed in Firefox 67url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=730fce689efe63b7de803de0d8794796

Trust: 0.1

title:Mozilla: Mozilla Foundation Security Advisory 2019-13url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=2019-13

Trust: 0.1

title:IBM: IBM Security Bulletin: Vyatta 5600 vRouter Software Patches – Release 1801-zurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=4ef3e54cc5cdc194f0526779f9480f89

Trust: 0.1

sources: VULMON: CVE-2019-7317

EXTERNAL IDS

db:NVDid:CVE-2019-7317

Trust: 2.1

db:BIDid:108098

Trust: 1.4

db:PACKETSTORMid:152561

Trust: 1.1

db:VULMONid:CVE-2019-7317

Trust: 0.1

db:PACKETSTORMid:152702

Trust: 0.1

db:PACKETSTORMid:152982

Trust: 0.1

db:PACKETSTORMid:154457

Trust: 0.1

db:PACKETSTORMid:154068

Trust: 0.1

db:PACKETSTORMid:153866

Trust: 0.1

db:PACKETSTORMid:153002

Trust: 0.1

db:PACKETSTORMid:154282

Trust: 0.1

sources: VULMON: CVE-2019-7317 // BID: 108098 // PACKETSTORM: 152702 // PACKETSTORM: 152982 // PACKETSTORM: 154457 // PACKETSTORM: 154068 // PACKETSTORM: 153866 // PACKETSTORM: 153002 // PACKETSTORM: 154282 // NVD: CVE-2019-7317

REFERENCES

url:https://github.com/glennrp/libpng/issues/275

Trust: 1.4

url:https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803

Trust: 1.4

url:https://www.debian.org/security/2019/dsa-4435

Trust: 1.4

url:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Trust: 1.4

url:https://usn.ubuntu.com/3962-1/

Trust: 1.2

url:http://www.securityfocus.com/bid/108098

Trust: 1.2

url:https://security.gentoo.org/glsa/201908-02

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2019:2495

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2019:2585

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2019:2737

Trust: 1.2

url:https://seclists.org/bugtraq/2019/apr/30

Trust: 1.1

url:http://packetstormsecurity.com/files/152561/slackware-security-advisory-libpng-updates.html

Trust: 1.1

url:https://seclists.org/bugtraq/2019/apr/36

Trust: 1.1

url:https://usn.ubuntu.com/3991-1/

Trust: 1.1

url:https://seclists.org/bugtraq/2019/may/56

Trust: 1.1

url:https://seclists.org/bugtraq/2019/may/59

Trust: 1.1

url:https://www.debian.org/security/2019/dsa-4448

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2019/05/msg00032.html

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:1265

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:1269

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:1267

Trust: 1.1

url:https://www.debian.org/security/2019/dsa-4451

Trust: 1.1

url:https://seclists.org/bugtraq/2019/may/67

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html

Trust: 1.1

url:https://usn.ubuntu.com/3997-1/

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:1310

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:1309

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:1308

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20190719-0005/

Trust: 1.1

url:https://usn.ubuntu.com/4080-1/

Trust: 1.1

url:https://usn.ubuntu.com/4083-1/

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:2494

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:2590

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:2592

Trust: 1.1

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbst03977en_us

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuapr2021.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuoct2021.html

Trust: 1.1

url:https://access.redhat.com/security/cve/cve-2019-7317

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-7317

Trust: 0.6

url:https://bugzilla.redhat.com/show_bug.cgi?id=1672409

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-11775

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-2762

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-2769

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-2769

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-11775

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-2816

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-2816

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-2762

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-11772

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-2786

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-11772

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-2786

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/416.html

Trust: 0.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921355

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=59551

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3962-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libpng1.6/1.6.34-2ubuntu0.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libpng1.6/1.6.34-1ubuntu0.18.04.2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9800

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11698

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11697

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11701

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/firefox/67.0+build2-0ubuntu0.18.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9816

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9821

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11695

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11696

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11691

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/firefox/67.0+build2-0ubuntu0.18.10.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9820

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/firefox/67.0+build2-0ubuntu0.16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/firefox/67.0+build2-0ubuntu0.19.04.1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3991-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14550

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14048

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2019-9800

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2019-11691

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2019-11692

Trust: 0.1

url:http://slackware.com

Trust: 0.1

url:https://www.mozilla.org/security/known-vulnerabilities/firefoxesr.html

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2019-9817

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2019-11698

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2019-9815

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2019-9797

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2018-18511

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2019-9820

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2019-5798

Trust: 0.1

url:http://slackware.com/gpg-key

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2019-9818

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2019-9816

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2019-9819

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2019-11693

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2019-7317

Trust: 0.1

url:http://osuosl.org)

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2019-14/#cve-2019-11694

Trust: 0.1

sources: VULMON: CVE-2019-7317 // BID: 108098 // PACKETSTORM: 152702 // PACKETSTORM: 152982 // PACKETSTORM: 154457 // PACKETSTORM: 154068 // PACKETSTORM: 153866 // PACKETSTORM: 153002 // PACKETSTORM: 154282 // NVD: CVE-2019-7317

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 108098

SOURCES

db:VULMONid:CVE-2019-7317
db:BIDid:108098
db:PACKETSTORMid:152702
db:PACKETSTORMid:152982
db:PACKETSTORMid:154457
db:PACKETSTORMid:154068
db:PACKETSTORMid:153866
db:PACKETSTORMid:153002
db:PACKETSTORMid:154282
db:NVDid:CVE-2019-7317

LAST UPDATE DATE

2025-06-26T20:21:21.694000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2019-7317date:2022-05-23T00:00:00
db:BIDid:108098date:2019-01-25T00:00:00
db:NVDid:CVE-2019-7317date:2024-11-21T04:48:00.033

SOURCES RELEASE DATE

db:VULMONid:CVE-2019-7317date:2019-02-04T00:00:00
db:BIDid:108098date:2019-01-25T00:00:00
db:PACKETSTORMid:152702date:2019-05-01T16:22:22
db:PACKETSTORMid:152982date:2019-05-21T23:06:42
db:PACKETSTORMid:154457date:2019-09-11T19:58:39
db:PACKETSTORMid:154068date:2019-08-15T20:14:24
db:PACKETSTORMid:153866date:2019-08-03T23:41:38
db:PACKETSTORMid:153002date:2019-05-22T14:39:49
db:PACKETSTORMid:154282date:2019-09-02T17:37:20
db:NVDid:CVE-2019-7317date:2019-02-04T08:29:00.447