ID

VAR-201905-0095


CVE

CVE-2019-5436


TITLE

Haxx libcurl Buffer error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201905-933

DESCRIPTION

A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1. curl/libcURL is prone a heap-based buffer-overflow vulnerability. An attacker can exploit these issues to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. libcurl versions 7.19.4 through 7.64.1 are vulnerable. Haxx libcurl is an open source client URL transfer library from Haxx, Sweden. The product supports protocols such as FTP, SFTP, TFTP and HTTP. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202003-29 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: cURL: Multiple vulnerabilities Date: March 15, 2020 Bugs: #686050, #694020 ID: 202003-29 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in cURL, the worst of which may lead to arbitrary code execution. Background ========== A command line tool and library for transferring data with URLs. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/curl < 7.66.0 >= 7.66.0 Description =========== Multiple vulnerabilities have been discovered in cURL. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All cURL users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/curl-7.66.0" References ========== [ 1 ] CVE-2019-5435 https://nvd.nist.gov/vuln/detail/CVE-2019-5435 [ 2 ] CVE-2019-5436 https://nvd.nist.gov/vuln/detail/CVE-2019-5436 [ 3 ] CVE-2019-5481 https://nvd.nist.gov/vuln/detail/CVE-2019-5481 [ 4 ] CVE-2019-5482 https://nvd.nist.gov/vuln/detail/CVE-2019-5482 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202003-29 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2020 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . ========================================================================== Ubuntu Security Notice USN-3993-1 May 22, 2019 curl vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 19.04 - Ubuntu 18.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in curl. This issue only affected Ubuntu 19.04. (CVE-2019-5435) It was discovered that curl incorrectly handled memory when receiving data from a TFTP server. (CVE-2019-5436) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 19.04: curl 7.64.0-2ubuntu1.1 libcurl3-gnutls 7.64.0-2ubuntu1.1 libcurl3-nss 7.64.0-2ubuntu1.1 libcurl4 7.64.0-2ubuntu1.1 Ubuntu 18.10: curl 7.61.0-1ubuntu2.4 libcurl3-gnutls 7.61.0-1ubuntu2.4 libcurl3-nss 7.61.0-1ubuntu2.4 libcurl4 7.61.0-1ubuntu2.4 Ubuntu 18.04 LTS: curl 7.58.0-2ubuntu3.7 libcurl3-gnutls 7.58.0-2ubuntu3.7 libcurl3-nss 7.58.0-2ubuntu3.7 libcurl4 7.58.0-2ubuntu3.7 Ubuntu 16.04 LTS: curl 7.47.0-1ubuntu2.13 libcurl3 7.47.0-1ubuntu2.13 libcurl3-gnutls 7.47.0-1ubuntu2.13 libcurl3-nss 7.47.0-1ubuntu2.13 In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Low: curl security update Advisory ID: RHSA-2020:2505-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:2505 Issue date: 2020-06-10 CVE Names: CVE-2019-5436 ==================================================================== 1. Summary: An update for curl is now available for Red Hat Enterprise Linux 7.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.7) - ppc64, ppc64le, s390x, x86_64 3. Description: The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: TFTP receive heap buffer overflow in tftp_receive_packet() function (CVE-2019-5436) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.7): Source: curl-7.29.0-54.el7_7.3.src.rpm x86_64: curl-7.29.0-54.el7_7.3.x86_64.rpm curl-debuginfo-7.29.0-54.el7_7.3.i686.rpm curl-debuginfo-7.29.0-54.el7_7.3.x86_64.rpm libcurl-7.29.0-54.el7_7.3.i686.rpm libcurl-7.29.0-54.el7_7.3.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7): x86_64: curl-debuginfo-7.29.0-54.el7_7.3.i686.rpm curl-debuginfo-7.29.0-54.el7_7.3.x86_64.rpm libcurl-devel-7.29.0-54.el7_7.3.i686.rpm libcurl-devel-7.29.0-54.el7_7.3.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.7): Source: curl-7.29.0-54.el7_7.3.src.rpm ppc64: curl-7.29.0-54.el7_7.3.ppc64.rpm curl-debuginfo-7.29.0-54.el7_7.3.ppc.rpm curl-debuginfo-7.29.0-54.el7_7.3.ppc64.rpm libcurl-7.29.0-54.el7_7.3.ppc.rpm libcurl-7.29.0-54.el7_7.3.ppc64.rpm libcurl-devel-7.29.0-54.el7_7.3.ppc.rpm libcurl-devel-7.29.0-54.el7_7.3.ppc64.rpm ppc64le: curl-7.29.0-54.el7_7.3.ppc64le.rpm curl-debuginfo-7.29.0-54.el7_7.3.ppc64le.rpm libcurl-7.29.0-54.el7_7.3.ppc64le.rpm libcurl-devel-7.29.0-54.el7_7.3.ppc64le.rpm s390x: curl-7.29.0-54.el7_7.3.s390x.rpm curl-debuginfo-7.29.0-54.el7_7.3.s390.rpm curl-debuginfo-7.29.0-54.el7_7.3.s390x.rpm libcurl-7.29.0-54.el7_7.3.s390.rpm libcurl-7.29.0-54.el7_7.3.s390x.rpm libcurl-devel-7.29.0-54.el7_7.3.s390.rpm libcurl-devel-7.29.0-54.el7_7.3.s390x.rpm x86_64: curl-7.29.0-54.el7_7.3.x86_64.rpm curl-debuginfo-7.29.0-54.el7_7.3.i686.rpm curl-debuginfo-7.29.0-54.el7_7.3.x86_64.rpm libcurl-7.29.0-54.el7_7.3.i686.rpm libcurl-7.29.0-54.el7_7.3.x86_64.rpm libcurl-devel-7.29.0-54.el7_7.3.i686.rpm libcurl-devel-7.29.0-54.el7_7.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-5436 https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXuETNtzjgjWX9erEAQgikBAAhYGp5wxFiu7hF3qvyO4xQFdMToHSFrmM Gsgmu1cw0hxq9Yk29MJ3t978tO1v9KGRy6q3pFCCnBlBTD81Jssa9cTYyuzJsf4u /aLgUkHOTlXV+pD/eziBWxtrKHGD2LbE+vUFlBoRgW6UZNrNvNkp+p9l18FSMi2j moXBVpwvoY4Vymdq0zfqzBNPOuBySzyAZ1qc3WNP+lb5xg6N7BIJAaeE+9bGgsfq IYDNZTY+uYR6tnfi/ESXAyF1wNmzVRNu/y+tOHrQwlE4vQFXOJLYosTCuyaDzJ8H pVnpP5Ru7XZGGclR5k3ri0LUtd3k37xnZ02FySMrkaiKQEGy2+u7XXkkfHc/ok76 p0uKGiN/+b6Sb1DIk14sgwEopYz8DYOFnh5TYfAgGdDOtfqrV3tXjGYRcCwNS302 BiQa39fW+tqB2QVVdjkTg28yNov/j70Kmn6GNmMX7aF/6VLJhudE2uby4qlAkzB3 OKPZ97bU2HwdcmjXKn05aqri91EbmEyQvT05aXF7+hR5MKpC0kvBrbZjvqAz0E5I WuIZsfan9Eh/Q9QVeE9N/4w8KGO4IxmRFMFYP6Hl7Le4kITsqDL6YDDjIUgCK1RW Q6jFa6sH6Az9r2bfxsm6LIY/d33HT2cvPxMNmz9MbukCmUt1EeWVZ1LkRteC2qy7 LbXQ0NlBXVw=PR1z -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . This only affects the oldstable distribution (stretch). CVE-2019-5481 Thomas Vegas discovered a double-free in the FTP-KRB code, triggered by a malicious server sending a very large data block. For the oldstable distribution (stretch), these problems have been fixed in version 7.52.1-5+deb9u10. For the stable distribution (buster), these problems have been fixed in version 7.64.0-4+deb10u1. We recommend that you upgrade your curl packages. For the detailed security status of curl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/curl Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEBsId305pBx+F583DbwzL4CFiRygFAl5UJtgACgkQbwzL4CFi RyiozQ//TWmlmQt7fsskJtczrkjToirTdbgmzBeRI6PL2HXEZYY7WtdQzXDHqTb5 eQwrIrKsSrS30QneeeGHPEABhfUBCIQRiXocd5enAdQbqPchTIVl92YrZhHZqjbU aP0q02QZrhn6nidzA+c3sU7ClW0YERVXOuVZAhQDnw0y1Iai5yVuQvIOhDYIEOdU G86svqzr4UAMdZPFP0N1avyHmonNB1/UC//l/g2s7q2ki7NOBCMfg2QV5+/6Ip0F tR8mgpukO7l+M0Jhb3SeCaGaRvbHDlkFIyGXKbDyffs14ceRykm/fhxB2bc8dSK7 KLGjRLXJyHKCCoWzafHk13aNGu0jVqaRrCcyezhI8fnr9V/enDbnzLeEWGGL8H3e qVTyY+ykypinWeIRv+5VQtgrAhEJ6ZCiGCmbRyhwP0s8Yu5MlOJeS1L4GnBUbYuH ZhB/DWtqFlh/Rgjs6XWr/CwzxFAps+wbKjY8l8/C18308J0bKq1sx4XWSEmXrMMj KbdVNKEjvA3n8HTa4CC+CgVA7723ysCERbKnTLKTu8rgPA9QDMyyxNpenVeB24DW G9rrnokVK0c56EeDlAOCB3gSA4XoDt3k+xP4vfaBcyzGj/mkEsOeAT6+lzqPbO30 KqjBEQgVzb5nvKpPhJF8f71DXegfFvDL2ti5G4wkfRME4ytM6Wg=QC2b -----END PGP SIGNATURE----- . Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Security Fix(es): * golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283) * SSL/TLS: CBC padding timing attack (lucky-13) (CVE-2013-0169) * grafana: XSS vulnerability via a column style on the "Dashboard > Table Panel" screen (CVE-2018-18624) * js-jquery: prototype pollution in object's prototype leading to denial of service or remote code execution or property injection (CVE-2019-11358) * npm-serialize-javascript: XSS via unsafe characters in serialized regular expressions (CVE-2019-16769) * kibana: Prototype pollution in TSVB could result in arbitrary code execution (ESA-2020-06) (CVE-2020-7013) * nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598) * npmjs-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser (CVE-2020-7662) * nodejs-lodash: prototype pollution in zipObjectDeep function (CVE-2020-8203) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * jQuery: passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) * grafana: stored XSS (CVE-2020-11110) * grafana: XSS annotation popup vulnerability (CVE-2020-12052) * grafana: XSS via column.title or cellLinkTooltip (CVE-2020-12245) * nodejs-elliptic: improper encoding checks allows a certain degree of signature malleability in ECDSA signatures (CVE-2020-13822) * golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) * openshift/console: text injection on error page via crafted url (CVE-2020-10715) * kibana: X-Frame-Option not set by default might lead to clickjacking (CVE-2020-10743) * openshift: restricted SCC allows pods to craft custom network packets (CVE-2020-14336) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Solution: For OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster - -cli.html. Bugs fixed (https://bugzilla.redhat.com/): 907589 - CVE-2013-0169 SSL/TLS: CBC padding timing attack (lucky-13) 1701972 - CVE-2019-11358 jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection 1767665 - CVE-2020-10715 openshift/console: text injection on error page via crafted url 1804533 - CVE-2020-9283 golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic 1813344 - CVE-2020-7598 nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload 1828406 - CVE-2020-11022 jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method 1834550 - CVE-2020-10743 kibana: X-Frame-Option not set by default might lead to clickjacking 1845982 - CVE-2020-7662 npmjs-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser 1848089 - CVE-2020-12052 grafana: XSS annotation popup vulnerability 1848092 - CVE-2019-16769 npm-serialize-javascript: XSS via unsafe characters in serialized regular expressions 1848643 - CVE-2020-12245 grafana: XSS via column.title or cellLinkTooltip 1848647 - CVE-2020-13822 nodejs-elliptic: improper encoding checks allows a certain degree of signature malleability in ECDSA signatures 1849044 - CVE-2020-7013 kibana: Prototype pollution in TSVB could result in arbitrary code execution (ESA-2020-06) 1850004 - CVE-2020-11023 jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution 1850572 - CVE-2018-18624 grafana: XSS vulnerability via a column style on the "Dashboard > Table Panel" screen 1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash 1857412 - CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function 1857977 - CVE-2020-15366 nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function 1858981 - CVE-2020-14336 openshift: restricted SCC allows pods to craft custom network packets 1861044 - CVE-2020-11110 grafana: stored XSS 1874671 - CVE-2020-14336 ose-machine-config-operator-container: openshift: restricted SCC allows pods to craft custom network packets [openshift-4] 5. 8) - aarch64, ppc64le, s390x, x86_64 3

Trust: 1.98

sources: NVD: CVE-2019-5436 // BID: 108435 // VULHUB: VHN-156871 // VULMON: CVE-2019-5436 // PACKETSTORM: 153010 // PACKETSTORM: 156753 // PACKETSTORM: 153003 // PACKETSTORM: 158035 // PACKETSTORM: 156523 // PACKETSTORM: 159727 // PACKETSTORM: 157425

AFFECTED PRODUCTS

vendor:netappmodel:steelstore cloud integrated storagescope:eqversion: -

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:42.3

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:oraclemodel:mysql serverscope:gteversion:5.7.28

Trust: 1.0

vendor:oraclemodel:mysql serverscope:lteversion:8.0.17

Trust: 1.0

vendor:netappmodel:hci management nodescope:eqversion: -

Trust: 1.0

vendor:haxxmodel:libcurlscope:lteversion:7.64.1

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.0

Trust: 1.0

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.4.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:lteversion:5.1.0

Trust: 1.0

vendor:oraclemodel:mysql serverscope:lteversion:5.7.27

Trust: 1.0

vendor:oraclemodel:oss support toolsscope:eqversion:20.0

Trust: 1.0

vendor:haxxmodel:libcurlscope:gteversion:7.19.4

Trust: 1.0

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.3.3

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:29

Trust: 1.0

vendor:netappmodel:solidfirescope:eqversion: -

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.1

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:gteversion:5.0.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:ubuntumodel:linuxscope:eqversion:19.04

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:18.10

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:18.04

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:16.04

Trust: 0.3

vendor:ubuntumodel:linux esmscope:eqversion:14.04

Trust: 0.3

vendor:ubuntumodel:linux esmscope:eqversion:12.04

Trust: 0.3

vendor:redhatmodel:software collections for rhelscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:8

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.64.1

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.64

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.63

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.62

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.61.1

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.61

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.60

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.59

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.58

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.57

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.56.1

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.56

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.55.1

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.54.1

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.54

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.53.1

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.53

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.52

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.51

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.50.3

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.50.2

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.50.1

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.50

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.47

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.46

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.43

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.42.1

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.36

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.34

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.33

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.32

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.31

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.30

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.25

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.23

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.22

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.21

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.20

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.19.6

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.19.5

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.19.4

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.55.0

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.52.1

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.49.0

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.48.0

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.42.0

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.41.0

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.40.0

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.39

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.38.0

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.37.1

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.37.0

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.35.0

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.29.0

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.28.1

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.28.0

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.27.0

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.26.0

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.24.0

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.23.1

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.21.7

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.21.6

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.21.5

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.21.4

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.21.3

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.21.2

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.21.1

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.20.1

Trust: 0.3

vendor:haxxmodel:libcurlscope:eqversion:7.19.7

Trust: 0.3

vendor:haxxmodel:libcurlscope:neversion:7.65

Trust: 0.3

sources: BID: 108435 // NVD: CVE-2019-5436

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-5436
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201905-933
value: HIGH

Trust: 0.6

VULHUB: VHN-156871
value: MEDIUM

Trust: 0.1

VULMON: CVE-2019-5436
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-5436
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-156871
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-5436
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-156871 // VULMON: CVE-2019-5436 // CNNVD: CNNVD-201905-933 // NVD: CVE-2019-5436

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-122

Trust: 1.0

problemtype:CWE-119

Trust: 0.1

sources: VULHUB: VHN-156871 // NVD: CVE-2019-5436

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201905-933

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201905-933

PATCH

title:Haxx libcurl Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92898

Trust: 0.6

title:Red Hat: Low: curl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202505 - Security Advisory

Trust: 0.1

title:Red Hat: Low: curl security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20201020 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: curl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20201792 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: curl vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3993-2

Trust: 0.1

title:Ubuntu Security Notice: curl vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3993-1

Trust: 0.1

title:Debian CVElist Bug Report Logs: curl: CVE-2019-5436: TFTP receive buffer overflowurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=af8cb489ed21fcca996e119afe1e5163

Trust: 0.1

title:Debian CVElist Bug Report Logs: curl: CVE-2019-5435: Integer overflows in curl_url_seturl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=fae65389c96796d30251ace6eb631de7

Trust: 0.1

title:Arch Linux Advisories: [ASA-201905-16] curl: arbitrary code executionurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201905-16

Trust: 0.1

title:Debian Security Advisories: DSA-4633-1 curl -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=13ee33e4932409d819a833a7d96f2574

Trust: 0.1

title:Arch Linux Advisories: [ASA-201905-12] libcurl-gnutls: arbitrary code executionurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201905-12

Trust: 0.1

title:Arch Linux Advisories: [ASA-201905-11] libcurl-compat: arbitrary code executionurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201905-11

Trust: 0.1

title:Amazon Linux AMI: ALAS-2019-1233url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2019-1233

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2019-5436

Trust: 0.1

title:Amazon Linux 2: ALAS2-2019-1233url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2019-1233

Trust: 0.1

title:Arch Linux Advisories: [ASA-201905-15] lib32-curl: arbitrary code executionurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201905-15

Trust: 0.1

title:Arch Linux Advisories: [ASA-201905-14] lib32-libcurl-compat: arbitrary code executionurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201905-14

Trust: 0.1

title:Arch Linux Advisories: [ASA-201905-13] lib32-libcurl-gnutls: arbitrary code executionurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201905-13

Trust: 0.1

title:Red Hat: Important: Container-native Virtualization security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203194 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.6.1 image security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20204298 - Security Advisory

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title:cveurl:https://github.com/michwqy/cve

Trust: 0.1

title: - url:https://github.com/vincent-deng/veracode-container-security-finding-parser

Trust: 0.1

sources: VULMON: CVE-2019-5436 // CNNVD: CNNVD-201905-933

EXTERNAL IDS

db:NVDid:CVE-2019-5436

Trust: 2.8

db:OPENWALLid:OSS-SECURITY/2019/09/11/6

Trust: 1.8

db:BIDid:108435

Trust: 1.1

db:PACKETSTORMid:158035

Trust: 0.8

db:PACKETSTORMid:157425

Trust: 0.8

db:PACKETSTORMid:156523

Trust: 0.8

db:CNNVDid:CNNVD-201905-933

Trust: 0.7

db:PACKETSTORMid:156753

Trust: 0.7

db:PACKETSTORMid:153003

Trust: 0.7

db:AUSCERTid:ESB-2019.1874

Trust: 0.6

db:AUSCERTid:ESB-2020.2033

Trust: 0.6

db:AUSCERTid:ESB-2020.0651

Trust: 0.6

db:AUSCERTid:ESB-2020.1494

Trust: 0.6

db:AUSCERTid:ESB-2020.1177

Trust: 0.6

db:AUSCERTid:ESB-2019.1837

Trust: 0.6

db:AUSCERTid:ESB-2019.4380

Trust: 0.6

db:AUSCERTid:ESB-2019.4780

Trust: 0.6

db:AUSCERTid:ESB-2020.3700

Trust: 0.6

db:AUSCERTid:ESB-2020.2593

Trust: 0.6

db:PACKETSTORMid:153051

Trust: 0.6

db:PACKETSTORMid:153010

Trust: 0.2

db:PACKETSTORMid:156986

Trust: 0.1

db:VULHUBid:VHN-156871

Trust: 0.1

db:VULMONid:CVE-2019-5436

Trust: 0.1

db:PACKETSTORMid:159727

Trust: 0.1

sources: VULHUB: VHN-156871 // VULMON: CVE-2019-5436 // BID: 108435 // PACKETSTORM: 153010 // PACKETSTORM: 156753 // PACKETSTORM: 153003 // PACKETSTORM: 158035 // PACKETSTORM: 156523 // PACKETSTORM: 159727 // PACKETSTORM: 157425 // CNNVD: CNNVD-201905-933 // NVD: CVE-2019-5436

REFERENCES

url:https://curl.haxx.se/docs/cve-2019-5436.html

Trust: 2.1

url:https://security.gentoo.org/glsa/202003-29

Trust: 1.9

url:https://seclists.org/bugtraq/2020/feb/36

Trust: 1.8

url:https://security.netapp.com/advisory/ntap-20190606-0004/

Trust: 1.8

url:https://support.f5.com/csp/article/k55133295

Trust: 1.8

url:https://www.debian.org/security/2020/dsa-4633

Trust: 1.8

url:https://www.oracle.com/security-alerts/cpuapr2020.html

Trust: 1.8

url:https://www.oracle.com/security-alerts/cpuoct2020.html

Trust: 1.8

url:https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2019/09/11/6

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html

Trust: 1.8

url:http://www.securityfocus.com/bid/108435

Trust: 1.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-5436

Trust: 1.2

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/smg3v4vtx2se3ew3hqtn3ddlqbtorqc2/

Trust: 1.1

url:https://support.f5.com/csp/article/k55133295?utm_source=f5support&amp%3butm_medium=rss

Trust: 1.1

url:http://curl.haxx.se/

Trust: 0.9

url:https://seclists.org/oss-sec/2019/q2/124

Trust: 0.9

url:https://usn.ubuntu.com/3993-1

Trust: 0.9

url:https://usn.ubuntu.com/3993-2

Trust: 0.9

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/smg3v4vtx2se3ew3hqtn3ddlqbtorqc2/

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2019-5436

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2019-5436cve-2019-5436curl:tftpreceiveheapbufferoverflowintftp_receive_packet()function

Trust: 0.6

url:https://support.f5.com/csp/article/k55133295?utm_source=f5support&utm_medium=rss

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1108041

Trust: 0.6

url:https://usn.ubuntu.com/3993-1/

Trust: 0.6

url:https://lists.debian.org/debian-lts-announce/2019/05/msg00036.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3700/

Trust: 0.6

url:https://packetstormsecurity.com/files/156523/debian-security-advisory-4633-1.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-flex-system-switch-firmware-products-are-affected-by-a-vulnerability-in-libcurl-cve-2019-5436/

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1143490

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2593/

Trust: 0.6

url:https://packetstormsecurity.com/files/153003/ubuntu-security-notice-usn-3993-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2033/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1874/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0651/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4780/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-libcurl-affects-the-os-image-for-redhat-enterprise-linux-for-ibm-cloud-pak-system-cve-2019-5436/

Trust: 0.6

url:https://vigilance.fr/vulnerability/curl-multiple-vulnerabilities-29382

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4380/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1837/

Trust: 0.6

url:https://packetstormsecurity.com/files/153051/slackware-security-advisory-curl-updates.html

Trust: 0.6

url:https://packetstormsecurity.com/files/157425/red-hat-security-advisory-2020-1792-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1494/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1177/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-bladecenter-advanced-management-module-amm-is-affected-by-a-vulnerability-in-libcurl-cve-2019-5436/

Trust: 0.6

url:https://packetstormsecurity.com/files/156753/gentoo-linux-security-advisory-202003-29.html

Trust: 0.6

url:https://packetstormsecurity.com/files/158035/red-hat-security-advisory-2020-2505-01.html

Trust: 0.6

url:cve-2019-5436 curl: tftp receive heap buffer overflow in tftp_receive_packet() function

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-5482

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-5481

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://access.redhat.com/errata/rhsa-2020:2505

Trust: 0.2

url:https://usn.ubuntu.com/usn/usn-3993-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-5435

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-5482

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-5481

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://support.f5.com/csp/article/k55133295?utm_source=f5support&amp;amp;utm_medium=rss

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=60232

Trust: 0.1

url:https://usn.ubuntu.com/3993-2/

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3993-2

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/curl/7.61.0-1ubuntu2.4

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/curl/7.58.0-2ubuntu3.7

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/curl/7.64.0-2ubuntu1.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.13

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.1

url:https://security-tracker.debian.org/tracker/curl

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8768

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-20852

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8535

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10743

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-15718

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20657

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19126

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1712

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8518

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-12448

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8611

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8203

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-6251

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8676

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-1549

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-9251

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17451

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-20060

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-19519

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11070

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-7150

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-1547

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-7664

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8607

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12052

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14973

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8623

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15366

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8594

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8690

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20060

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13752

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8601

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3822

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11324

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19925

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3823

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-7146

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-1010204

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-7013

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11324

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11236

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8524

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-10739

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-18751

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16890

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8536

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8686

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8671

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12447

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8544

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12049

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8571

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-19519

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15719

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2013-0169

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8677

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-18624

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8595

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13753

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8558

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11459

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11358

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-12447

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8679

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-12795

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-20657

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-5094

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3844

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-6454

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20852

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-12450

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20483

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14336

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8619

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4298

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8622

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-1010180

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-7598

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8681

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3825

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8523

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-18074

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0169

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-6237

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-6706

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-20483

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20337

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8673

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8559

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8687

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13822

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.6/updating/updating-cluster

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19923

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-16769

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8672

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11023

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11358

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14822

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14404

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8608

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-7662

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8615

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-12449

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-7665

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8666

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8457

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-5953

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8689

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-15847

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14498

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8735

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11236

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19924

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8586

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12245

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14404

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8726

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-1010204

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8596

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8696

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8610

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-18408

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13636

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-1563

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16890

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11070

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14498

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-7149

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12450

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-16056

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-10739

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-20337

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-18074

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11110

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8584

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19959

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8675

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8563

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10531

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13232

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3843

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14040

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-1010180

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12449

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10715

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8609

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9283

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8587

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-18751

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8506

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-18624

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11022

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8583

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-9251

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12448

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11008

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11459

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8597

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:1792

Trust: 0.1

sources: VULHUB: VHN-156871 // VULMON: CVE-2019-5436 // BID: 108435 // PACKETSTORM: 153010 // PACKETSTORM: 156753 // PACKETSTORM: 153003 // PACKETSTORM: 158035 // PACKETSTORM: 156523 // PACKETSTORM: 159727 // PACKETSTORM: 157425 // CNNVD: CNNVD-201905-933 // NVD: CVE-2019-5436

CREDITS

Ubuntu,Debian,Red Hat,Slackware Security Team,l00p3r.,Gentoo

Trust: 0.6

sources: CNNVD: CNNVD-201905-933

SOURCES

db:VULHUBid:VHN-156871
db:VULMONid:CVE-2019-5436
db:BIDid:108435
db:PACKETSTORMid:153010
db:PACKETSTORMid:156753
db:PACKETSTORMid:153003
db:PACKETSTORMid:158035
db:PACKETSTORMid:156523
db:PACKETSTORMid:159727
db:PACKETSTORMid:157425
db:CNNVDid:CNNVD-201905-933
db:NVDid:CVE-2019-5436

LAST UPDATE DATE

2025-11-19T21:25:50.247000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-156871date:2020-10-20T00:00:00
db:VULMONid:CVE-2019-5436date:2023-11-07T00:00:00
db:BIDid:108435date:2019-05-22T00:00:00
db:CNNVDid:CNNVD-201905-933date:2021-03-18T00:00:00
db:NVDid:CVE-2019-5436date:2024-11-21T04:44:55.937

SOURCES RELEASE DATE

db:VULHUBid:VHN-156871date:2019-05-28T00:00:00
db:VULMONid:CVE-2019-5436date:2019-05-28T00:00:00
db:BIDid:108435date:2019-05-22T00:00:00
db:PACKETSTORMid:153010date:2019-05-22T23:23:23
db:PACKETSTORMid:156753date:2020-03-16T13:55:33
db:PACKETSTORMid:153003date:2019-05-22T14:39:56
db:PACKETSTORMid:158035date:2020-06-11T16:34:00
db:PACKETSTORMid:156523date:2020-02-25T15:20:44
db:PACKETSTORMid:159727date:2020-10-27T16:59:02
db:PACKETSTORMid:157425date:2020-04-28T20:19:57
db:CNNVDid:CNNVD-201905-933date:2019-05-22T00:00:00
db:NVDid:CVE-2019-5436date:2019-05-28T19:29:06.127